cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 199.820771] ldm_validate_privheads(): Disk read failed. [ 199.836859] loop1: p1[EZD] [ 199.840997] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:31 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000000c0)=0xfffffffffffffff7) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x40300) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x440000) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) userfaultfd(0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000200)=0x432, 0xfffffffffffffc74) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0xfffffec7) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000380)) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:25:31 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 199.868091] loop1: partition table partially beyond EOD, truncated [ 199.880341] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 199.898610] loop1: p1 start 1 is beyond EOD, truncated [ 199.909145] loop5: p1[EZD] 03:25:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) 03:25:32 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:25:32 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x101000) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:32 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) [ 200.125352] 9pnet: Insufficient options for proto=fd [ 200.183263] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.203240] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.222388] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) [ 200.226016] loop4: p1[EZD] [ 200.241108] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.265030] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.266386] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.291767] loop5: p1[EZD] 03:25:32 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 200.317295] loop1: p1[EZD] 03:25:32 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:25:32 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x101000) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 200.420457] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.458354] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.500942] loop2: p1[EZD] [ 200.521242] 9pnet: Insufficient options for proto=fd [ 200.553502] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.567584] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.582574] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 200.588838] loop5: p1[EZD] [ 200.593968] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.604447] print_req_error: 79 callbacks suppressed [ 200.604453] print_req_error: I/O error, dev loop2, sector 1 [ 200.608944] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.621879] print_req_error: I/O error, dev loop2, sector 1 [ 200.627669] buffer_io_error: 10 callbacks suppressed [ 200.627676] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 200.640434] print_req_error: I/O error, dev loop2, sector 2 [ 200.646147] Buffer I/O error on dev loop2p1, logical block 1, async page read [ 200.646178] print_req_error: I/O error, dev loop2, sector 3 [ 200.646186] Buffer I/O error on dev loop2p1, logical block 2, async page read [ 200.646203] print_req_error: I/O error, dev loop2, sector 4 [ 200.646210] Buffer I/O error on dev loop2p1, logical block 3, async page read [ 200.646225] print_req_error: I/O error, dev loop2, sector 5 [ 200.672619] Buffer I/O error on dev loop2p1, logical block 4, async page read [ 200.688141] loop4: p1[EZD] [ 200.692955] print_req_error: I/O error, dev loop2, sector 6 [ 200.692967] Buffer I/O error on dev loop2p1, logical block 5, async page read [ 200.692983] print_req_error: I/O error, dev loop2, sector 7 [ 200.692989] Buffer I/O error on dev loop2p1, logical block 6, async page read [ 200.693010] print_req_error: I/O error, dev loop2, sector 8 [ 200.701762] Buffer I/O error on dev loop2p1, logical block 7, async page read [ 200.710528] print_req_error: I/O error, dev loop2, sector 1 [ 200.722107] Buffer I/O error on dev loop2p1, logical block 0, async page read 03:25:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:25:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="d7d91f2c552ce1946b5e154b0aa6f4629c473be1870685440fada7b41813fbf498983238adecd878a85659002f027cbd9ce2a439f9a0bc2f5ebdadacaa87ad3d36b574e5576baa1465add20ad913d92e73b63485125b0cdc9e58692b754474f6b8bbff", 0x63}, {&(0x7f0000000100)="0f2877eb19f2a31cde0d901051513f25107e1ac2d5b51f9b9ccf1541a675e387e01914e17bdcdf1f3f64098fbc210308550bb8488987ddec951667650520afc88a9402549b9abea94eaef87714776142c4084045214c772d4ef9b61a92c6494fe2c8f01c83a05ab643105c5f64184172316a0ecc3f7452d4ee1b3e4830b91d4bda4f97c4a49ce1b9ece121a034abb788d979bad42547", 0x96}], 0x2) writev(r1, &(0x7f0000000040)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, r1) [ 200.722144] Buffer I/O error on dev loop2p1, logical block 1, async page read 03:25:32 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:32 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) poll(0x0, 0xfffffffffffffde6, 0xfffffffffffffc01) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000240)={0x7, 0x8000, 0x1f}) rt_sigaction(0x32, &(0x7f0000000100)={&(0x7f0000000040)="3e660f16991f907c9b430fc200bcc481e973d00964652e470f380559ffc481fd294d0ec423c55e905f5d000000c402790eef8f29e09bd366f04783a70700000000666666430fae3d00000000", {0x7}, 0x0, &(0x7f00000000c0)="c4e31d4a7900f4c461d573db02410fae67a52666470f3a1660f801c4e1f97ffc3e2e660ffded2e65d90561726396260f1bb46c1cbaa69cc421cd60d0660fe93a"}, &(0x7f00000001c0)={&(0x7f0000000140)="0f0fa10c0000001c8a8049d0e8076fc4817dd7cc78183e47a5f30fbd7e9ec422019b0067460f6aa108000000260f38081c38", {}, 0x0, &(0x7f0000000180)="c4e165e5048067d9f3c442d5dcd6c442210795090000003ef241afc442b1abf5f2f042870ac4e22191ac35a85300000f1197930000000faeee"}, 0x8, &(0x7f0000000200)) [ 200.822073] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 200.859462] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 200.874224] loop1: p1[EZD] 03:25:32 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:33 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:33 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 200.934731] audit: type=1400 audit(1564716332.985:55): avc: denied { sys_admin } for pid=8783 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 200.969669] FAULT_INJECTION: forcing a failure. [ 200.969669] name failslab, interval 1, probability 0, space 0, times 1 [ 201.017356] CPU: 0 PID: 8790 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 201.024424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.033779] Call Trace: [ 201.036358] dump_stack+0x138/0x19c [ 201.039987] should_fail.cold+0x10f/0x159 [ 201.044143] should_failslab+0xdb/0x130 [ 201.048128] kmem_cache_alloc_trace+0x2e9/0x790 [ 201.052804] ? lock_downgrade+0x6e0/0x6e0 [ 201.056961] sctp_association_new+0x6b/0x1e40 [ 201.061463] ? sctp_v6_scope+0x46/0x50 [ 201.066825] __sctp_connect+0x631/0xc00 [ 201.070803] ? sctp_clear_owner_w+0x120/0x120 [ 201.075279] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.079851] ? trace_hardirqs_on_caller+0x400/0x590 [ 201.084849] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.089414] sctp_connect+0xb8/0x100 [ 201.093114] inet_dgram_connect+0x114/0x1e0 [ 201.097429] SYSC_connect+0x1f6/0x2d0 [ 201.101221] ? SYSC_bind+0x220/0x220 [ 201.104928] ? fput+0xd4/0x150 [ 201.108100] ? SyS_write+0x15e/0x230 [ 201.111807] SyS_connect+0x24/0x30 [ 201.115357] ? SyS_accept+0x30/0x30 [ 201.118967] do_syscall_64+0x1e8/0x640 [ 201.122842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.127690] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.132885] RIP: 0033:0x459829 [ 201.136062] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 201.143769] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 201.151025] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 201.158273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:33 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, 0x0) 03:25:33 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 201.165630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 201.172892] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 201.207056] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 201.236078] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 201.253849] loop4: p1[EZD] [ 201.267493] FAULT_INJECTION: forcing a failure. [ 201.267493] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 201.279323] CPU: 0 PID: 8808 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 201.279340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.279344] Call Trace: [ 201.279361] dump_stack+0x138/0x19c [ 201.279379] should_fail.cold+0x10f/0x159 [ 201.279397] __alloc_pages_nodemask+0x1d6/0x7a0 [ 201.279411] ? __alloc_pages_slowpath+0x2930/0x2930 [ 201.279432] cache_grow_begin+0x80/0x400 [ 201.279444] kmem_cache_alloc_trace+0x6b2/0x790 [ 201.279456] ? lock_downgrade+0x6e0/0x6e0 [ 201.279470] sctp_association_new+0x6b/0x1e40 03:25:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) getsockname$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value={0x0}, &(0x7f0000002000)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x4b, &(0x7f00000003c0)={{{@in6=@rand_addr="17f71b7987c0c40ba04f931361372558", @in6=@rand_addr="2ab8e761b35d7784a37433bf665fc594"}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, 0xe8) r5 = dup2(r1, r3) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x20000000000000, 0x10000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000140)={r4, 0x7ff, 0x7, 0x5, 0x84, 0x3}, 0x14) dup3(r5, r2, 0x0) [ 201.279481] ? sctp_v6_scope+0x46/0x50 [ 201.279491] __sctp_connect+0x631/0xc00 [ 201.279505] ? sctp_clear_owner_w+0x120/0x120 [ 201.279517] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.295884] ? trace_hardirqs_on_caller+0x400/0x590 [ 201.295898] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.295911] sctp_connect+0xb8/0x100 [ 201.295925] inet_dgram_connect+0x114/0x1e0 [ 201.295952] SYSC_connect+0x1f6/0x2d0 [ 201.302133] ? SYSC_bind+0x220/0x220 [ 201.302152] ? fput+0xd4/0x150 [ 201.302161] ? SyS_write+0x15e/0x230 [ 201.315977] SyS_connect+0x24/0x30 [ 201.315986] ? SyS_accept+0x30/0x30 [ 201.315999] do_syscall_64+0x1e8/0x640 [ 201.324693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.324710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.324717] RIP: 0033:0x459829 [ 201.324724] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 [ 201.333325] ORIG_RAX: 000000000000002a [ 201.333332] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 201.333338] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 03:25:33 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 201.333344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.333349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 201.333355] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 201.407559] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 201.481543] IPVS: ftp: loaded support on port[0] = 21 [ 201.489761] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 201.505611] FAULT_INJECTION: forcing a failure. [ 201.505611] name failslab, interval 1, probability 0, space 0, times 0 [ 201.517652] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 201.529445] loop1: p1[EZD] [ 201.543702] CPU: 0 PID: 8817 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 201.550739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.560088] Call Trace: [ 201.562683] dump_stack+0x138/0x19c [ 201.566323] should_fail.cold+0x10f/0x159 [ 201.570483] should_failslab+0xdb/0x130 [ 201.574464] __kmalloc+0x2f0/0x7a0 [ 201.578009] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 201.583460] ? sctp_stream_init+0x83/0x2d0 [ 201.587696] ? rcu_read_lock_sched_held+0x110/0x130 [ 201.592887] ? sctp_stream_init+0x98/0x2d0 [ 201.597128] sctp_stream_init+0x98/0x2d0 [ 201.601200] sctp_association_new+0x10c3/0x1e40 [ 201.605877] __sctp_connect+0x631/0xc00 [ 201.609860] ? sctp_clear_owner_w+0x120/0x120 [ 201.614355] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.618932] ? trace_hardirqs_on_caller+0x400/0x590 [ 201.623949] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.628528] sctp_connect+0xb8/0x100 [ 201.632250] inet_dgram_connect+0x114/0x1e0 [ 201.636569] SYSC_connect+0x1f6/0x2d0 [ 201.640383] ? SYSC_bind+0x220/0x220 [ 201.644099] ? fput+0xd4/0x150 [ 201.647286] ? SyS_write+0x15e/0x230 [ 201.651001] SyS_connect+0x24/0x30 [ 201.654530] ? SyS_accept+0x30/0x30 [ 201.658203] do_syscall_64+0x1e8/0x640 [ 201.662068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.666983] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.672151] RIP: 0033:0x459829 [ 201.675322] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 201.683011] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 201.690348] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 201.697595] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.704842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 201.712089] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:33 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:33 executing program 2: r0 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r1}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r5, 0x1000, 0x4, [0xd63, 0x9b02, 0x81, 0x2]}, &(0x7f0000000440)=0x10) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000500)) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r2) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f123c12") r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000400)=""/44, &(0x7f0000000100)=0x4) dup2(0xffffffffffffffff, r6) 03:25:33 executing program 3 (fault-call:4 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:33 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 201.763023] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 201.775279] loop5: p1[EZD] [ 201.800439] FAULT_INJECTION: forcing a failure. [ 201.800439] name failslab, interval 1, probability 0, space 0, times 0 [ 201.812217] CPU: 0 PID: 8831 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 201.819234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.819239] Call Trace: [ 201.819255] dump_stack+0x138/0x19c [ 201.819273] should_fail.cold+0x10f/0x159 [ 201.838959] should_failslab+0xdb/0x130 [ 201.838973] kmem_cache_alloc_trace+0x2e9/0x790 [ 201.838985] ? __ipv6_addr_type+0x199/0x28f [ 201.838998] sctp_add_bind_addr+0x6d/0x360 [ 201.839007] sctp_copy_one_addr+0xf9/0x120 [ 201.839018] sctp_bind_addr_copy+0xfc/0x294 [ 201.839029] sctp_assoc_set_bind_addr_from_ep+0x13a/0x190 [ 201.839038] __sctp_connect+0x652/0xc00 [ 201.839050] ? sctp_clear_owner_w+0x120/0x120 [ 201.839058] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.860512] ? trace_hardirqs_on_caller+0x400/0x590 [ 201.860528] ? __local_bh_enable_ip+0x99/0x1a0 [ 201.860542] sctp_connect+0xb8/0x100 [ 201.860555] inet_dgram_connect+0x114/0x1e0 [ 201.860568] SYSC_connect+0x1f6/0x2d0 [ 201.860581] ? SYSC_bind+0x220/0x220 [ 201.870416] ? fput+0xd4/0x150 03:25:34 executing program 3 (fault-call:4 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 201.870429] ? SyS_write+0x15e/0x230 [ 201.870446] SyS_connect+0x24/0x30 [ 201.870454] ? SyS_accept+0x30/0x30 [ 201.870467] do_syscall_64+0x1e8/0x640 [ 201.870475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.870491] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.878919] RIP: 0033:0x459829 [ 201.878925] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 201.878936] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 201.878942] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 03:25:34 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 201.878947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.878955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 201.893244] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 202.075284] FAULT_INJECTION: forcing a failure. [ 202.075284] name failslab, interval 1, probability 0, space 0, times 0 [ 202.090850] CPU: 1 PID: 8851 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 202.097885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.107227] Call Trace: [ 202.107244] dump_stack+0x138/0x19c [ 202.113429] should_fail.cold+0x10f/0x159 [ 202.113447] should_failslab+0xdb/0x130 03:25:34 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 202.113460] kmem_cache_alloc_trace+0x2e9/0x790 [ 202.113473] ? __ipv6_addr_type+0x199/0x28f [ 202.130529] sctp_add_bind_addr+0x6d/0x360 [ 202.134777] sctp_copy_one_addr+0xf9/0x120 [ 202.139021] sctp_bind_addr_copy+0xfc/0x294 [ 202.143343] sctp_assoc_set_bind_addr_from_ep+0x13a/0x190 [ 202.148883] __sctp_connect+0x652/0xc00 [ 202.152864] ? sctp_clear_owner_w+0x120/0x120 [ 202.157359] ? __local_bh_enable_ip+0x99/0x1a0 [ 202.161939] ? trace_hardirqs_on_caller+0x400/0x590 [ 202.161954] ? __local_bh_enable_ip+0x99/0x1a0 [ 202.161967] sctp_connect+0xb8/0x100 [ 202.161979] inet_dgram_connect+0x114/0x1e0 [ 202.161990] SYSC_connect+0x1f6/0x2d0 [ 202.162001] ? SYSC_bind+0x220/0x220 [ 202.162020] ? fput+0xd4/0x150 [ 202.162031] ? SyS_write+0x15e/0x230 [ 202.175399] SyS_connect+0x24/0x30 [ 202.175409] ? SyS_accept+0x30/0x30 [ 202.175423] do_syscall_64+0x1e8/0x640 [ 202.175432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.175447] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.201250] RIP: 0033:0x459829 [ 202.201257] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 202.201270] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 202.201276] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 202.201282] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.201288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 202.201294] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 202.220394] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 202.279104] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 202.300135] loop4: p1[EZD] 03:25:34 executing program 3 (fault-call:4 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:34 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:34 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x9, 0x101000) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 202.440561] FAULT_INJECTION: forcing a failure. [ 202.440561] name failslab, interval 1, probability 0, space 0, times 0 [ 202.493272] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 202.517654] CPU: 1 PID: 8875 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 202.524713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.524720] Call Trace: [ 202.524737] dump_stack+0x138/0x19c [ 202.524758] should_fail.cold+0x10f/0x159 [ 202.543153] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 202.544448] should_failslab+0xdb/0x130 [ 202.544462] kmem_cache_alloc_trace+0x2e9/0x790 [ 202.544477] ? sctp_copy_one_addr+0x5a/0x120 [ 202.557224] loop5: p1[EZD] [ 202.558979] sctp_transport_new+0x65/0x880 [ 202.558992] sctp_assoc_add_peer+0x1f8/0xfd0 [ 202.559007] __sctp_connect+0x200/0xc00 [ 202.566331] ? sctp_clear_owner_w+0x120/0x120 [ 202.566344] ? __local_bh_enable_ip+0x99/0x1a0 [ 202.566357] ? trace_hardirqs_on_caller+0x400/0x590 [ 202.566366] ? __local_bh_enable_ip+0x99/0x1a0 [ 202.566375] sctp_connect+0xb8/0x100 [ 202.566385] inet_dgram_connect+0x114/0x1e0 [ 202.566394] SYSC_connect+0x1f6/0x2d0 [ 202.566402] ? SYSC_bind+0x220/0x220 [ 202.566415] ? fput+0xd4/0x150 [ 202.566422] ? SyS_write+0x15e/0x230 [ 202.566432] SyS_connect+0x24/0x30 [ 202.566438] ? SyS_accept+0x30/0x30 [ 202.566447] do_syscall_64+0x1e8/0x640 [ 202.579120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.579140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:25:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x26, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0, 0x1800000, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x542}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0xffffffff, 0x400000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000540)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800)) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xffffffff, 0x2) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000000)) r4 = dup2(r2, r2) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000140)={@loopback, @loopback}, 0x8) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000100)) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x28042, 0x0) getpeername$inet(r4, &(0x7f00000003c0)={0x2, 0x0, @multicast1}, &(0x7f0000000400)=0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x3f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 'lblcr\x00', 0x1, 0x7, 0x50}, 0x2c) connect$inet(r5, 0x0, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r6, 0x80003) [ 202.579149] RIP: 0033:0x459829 [ 202.593188] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 202.593201] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 202.593207] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 202.593213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.593219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 202.593225] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 202.718281] 9pnet: Insufficient options for proto=fd [ 202.741244] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 202.779210] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:34 executing program 3 (fault-call:4 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 202.802868] loop4: p1[EZD] [ 202.820962] IPVS: set_ctl: invalid protocol: 63 172.30.0.3:20000 [ 202.840946] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 202.869810] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 202.885772] IPVS: set_ctl: invalid protocol: 63 172.30.0.3:20000 [ 202.901044] loop1: p1[EZD] [ 202.907342] FAULT_INJECTION: forcing a failure. [ 202.907342] name failslab, interval 1, probability 0, space 0, times 0 [ 202.946187] CPU: 0 PID: 8909 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 202.953248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.962598] Call Trace: [ 202.962616] dump_stack+0x138/0x19c [ 202.962634] should_fail.cold+0x10f/0x159 [ 202.962648] should_failslab+0xdb/0x130 [ 202.968848] kmem_cache_alloc_node_trace+0x5a/0x770 [ 202.968864] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 202.968879] __kmalloc_node_track_caller+0x3d/0x80 [ 202.968893] __kmalloc_reserve.isra.0+0x40/0xe0 [ 202.981985] __alloc_skb+0xcf/0x500 [ 202.981998] ? skb_scrub_packet+0x4b0/0x4b0 [ 202.982012] ? sctp_bind_addrs_to_raw+0x200/0x320 [ 202.982026] _sctp_make_chunk+0x51/0x270 [ 202.997048] ? ipv6_dev_get_saddr+0x33f/0x9b0 [ 202.997070] sctp_make_control+0x35/0x150 [ 202.997082] sctp_make_init+0x5e9/0xad0 [ 203.005013] ? sctp_init_cause+0xd0/0xd0 [ 203.005029] ? __lock_acquire+0x5f7/0x4620 [ 203.005040] ? __lock_acquire+0x5f7/0x4620 [ 203.005051] ? trace_hardirqs_on+0x10/0x10 [ 203.013936] ? xfrm_policy_lookup+0x70/0x70 [ 203.013949] ? sctp_sm_lookup_event+0xf7/0x34a [ 203.013964] sctp_sf_do_prm_asoc+0xc2/0x350 [ 203.013976] sctp_do_sm+0xfb/0x4ae0 [ 203.013988] ? save_trace+0x290/0x290 [ 203.063758] ? save_trace+0x290/0x290 [ 203.069085] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 203.075041] ? find_held_lock+0x35/0x130 [ 203.079088] ? sctp_hash_transport+0xbec/0x1510 [ 203.083779] ? lock_downgrade+0x6e0/0x6e0 [ 203.091236] ? sctp_hash_transport+0xee/0x1510 [ 203.096585] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 203.102106] ? memcpy+0x46/0x50 [ 203.105384] ? sctp_assoc_set_primary+0x236/0x2d0 [ 203.110212] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 203.114865] __sctp_connect+0x785/0xc00 [ 203.118826] ? sctp_clear_owner_w+0x120/0x120 [ 203.123302] ? __local_bh_enable_ip+0x99/0x1a0 [ 203.127868] ? trace_hardirqs_on_caller+0x400/0x590 [ 203.132871] ? __local_bh_enable_ip+0x99/0x1a0 [ 203.137450] sctp_connect+0xb8/0x100 [ 203.141149] inet_dgram_connect+0x114/0x1e0 [ 203.145456] SYSC_connect+0x1f6/0x2d0 [ 203.149241] ? SYSC_bind+0x220/0x220 [ 203.152945] ? fput+0xd4/0x150 [ 203.156123] ? SyS_write+0x15e/0x230 [ 203.159830] SyS_connect+0x24/0x30 [ 203.163354] ? SyS_accept+0x30/0x30 [ 203.166965] do_syscall_64+0x1e8/0x640 [ 203.170833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.175665] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.180849] RIP: 0033:0x459829 [ 203.184023] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 03:25:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xffffffffffffff5c) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$midi(0x0, 0x7, 0x8001) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x3, r1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) epoll_create1(0x80000) 03:25:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:35 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 203.191719] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 203.198981] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 203.206234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.213484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 203.220732] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:35 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:35 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x101000) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:35 executing program 3 (fault-call:4 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 203.456098] 9pnet: Insufficient options for proto=fd [ 203.487087] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 203.503949] FAULT_INJECTION: forcing a failure. [ 203.503949] name failslab, interval 1, probability 0, space 0, times 0 [ 203.508905] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 203.559294] CPU: 1 PID: 8935 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 203.566366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.575721] Call Trace: [ 203.575740] dump_stack+0x138/0x19c [ 203.575772] should_fail.cold+0x10f/0x159 [ 203.581974] should_failslab+0xdb/0x130 [ 203.581988] kmem_cache_alloc+0x47/0x780 [ 203.581999] ? __alloc_skb+0x3ee/0x500 [ 203.582011] ? skb_scrub_packet+0x4b0/0x4b0 [ 203.582026] sctp_chunkify+0x4b/0x280 03:25:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 203.582036] _sctp_make_chunk+0x14d/0x270 [ 203.582046] ? ipv6_dev_get_saddr+0x33f/0x9b0 [ 203.582057] sctp_make_control+0x35/0x150 [ 203.586272] loop4: p1[EZD] [ 203.590152] sctp_make_init+0x5e9/0xad0 [ 203.590170] ? sctp_init_cause+0xd0/0xd0 [ 203.590182] ? __lock_acquire+0x5f7/0x4620 [ 203.590191] ? __lock_acquire+0x5f7/0x4620 [ 203.590201] ? trace_hardirqs_on+0x10/0x10 [ 203.590212] ? xfrm_policy_lookup+0x70/0x70 [ 203.590222] ? sctp_sm_lookup_event+0xf7/0x34a [ 203.590234] sctp_sf_do_prm_asoc+0xc2/0x350 [ 203.590245] sctp_do_sm+0xfb/0x4ae0 [ 203.606277] ? save_trace+0x290/0x290 [ 203.606287] ? save_trace+0x290/0x290 [ 203.606305] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 203.619045] ? find_held_lock+0x35/0x130 [ 203.619059] ? sctp_hash_transport+0xbec/0x1510 [ 203.619075] ? lock_downgrade+0x6e0/0x6e0 [ 203.625950] ? sctp_hash_transport+0xee/0x1510 [ 203.625964] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 203.625977] ? memcpy+0x46/0x50 [ 203.642685] ? sctp_assoc_set_primary+0x236/0x2d0 [ 203.642702] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 203.642713] __sctp_connect+0x785/0xc00 [ 203.651684] ? sctp_clear_owner_w+0x120/0x120 [ 203.651695] ? retint_kernel+0x2d/0x2d [ 203.651709] ? sctp_connect+0x6a/0x100 [ 203.651717] sctp_connect+0xb8/0x100 [ 203.651729] inet_dgram_connect+0x114/0x1e0 [ 203.651741] SYSC_connect+0x1f6/0x2d0 [ 203.651750] ? SYSC_bind+0x220/0x220 [ 203.651772] ? fput+0xd4/0x150 [ 203.743525] ? SyS_write+0x15e/0x230 [ 203.747235] SyS_connect+0x24/0x30 [ 203.750760] ? SyS_accept+0x30/0x30 [ 203.754369] do_syscall_64+0x1e8/0x640 [ 203.758265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.763180] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.768349] RIP: 0033:0x459829 [ 203.771519] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 203.779210] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 203.786460] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 203.793710] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.800960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 203.808215] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 203.841351] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 203.863653] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 203.876107] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 203.877618] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 203.893446] loop1: p1[EZD] 03:25:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:36 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:36 executing program 3 (fault-call:4 fault-nth:8): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 203.950999] loop5: p1[EZD] [ 204.045462] FAULT_INJECTION: forcing a failure. [ 204.045462] name failslab, interval 1, probability 0, space 0, times 0 [ 204.131682] CPU: 0 PID: 8967 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 204.138748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.148101] Call Trace: [ 204.150697] dump_stack+0x138/0x19c [ 204.154332] should_fail.cold+0x10f/0x159 [ 204.158485] should_failslab+0xdb/0x130 [ 204.162464] kmem_cache_alloc_node+0x287/0x780 [ 204.167059] __alloc_skb+0x9c/0x500 [ 204.170690] ? skb_scrub_packet+0x4b0/0x4b0 [ 204.175008] ? ip6_mtu+0x287/0x410 [ 204.178554] sctp_packet_transmit+0x351/0x3020 [ 204.183135] ? sctp_packet_config+0x614/0x9f0 [ 204.187639] ? __sctp_packet_append_chunk+0x39d/0xb40 [ 204.192829] ? sctp_packet_config+0x9f0/0x9f0 [ 204.192841] ? sctp_packet_append_chunk+0x4f0/0xaf0 [ 204.192856] sctp_outq_flush+0x841/0x31b0 [ 204.202591] ? find_held_lock+0x35/0x130 [ 204.202605] ? perf_trace_itimer_state+0x363/0x640 [ 204.202624] ? __sctp_outq_teardown+0xde0/0xde0 [ 204.202632] ? trace_hardirqs_on_caller+0x400/0x590 [ 204.202644] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 204.202663] sctp_outq_uncork+0x60/0x70 [ 204.235299] sctp_do_sm+0x417/0x4ae0 [ 204.238998] ? save_trace+0x290/0x290 [ 204.242784] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 204.248734] ? find_held_lock+0x35/0x130 [ 204.252783] ? sctp_hash_transport+0xbec/0x1510 [ 204.257437] ? lock_downgrade+0x6e0/0x6e0 [ 204.261568] ? sctp_hash_transport+0xee/0x1510 [ 204.266136] ? memcpy+0x46/0x50 [ 204.269395] ? sctp_assoc_set_primary+0x236/0x2d0 [ 204.274329] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 204.279433] __sctp_connect+0x785/0xc00 [ 204.283396] ? sctp_clear_owner_w+0x120/0x120 [ 204.287871] ? __local_bh_enable_ip+0x99/0x1a0 [ 204.292433] ? trace_hardirqs_on_caller+0x400/0x590 [ 204.297434] ? __local_bh_enable_ip+0x99/0x1a0 [ 204.302002] sctp_connect+0xb8/0x100 [ 204.305698] inet_dgram_connect+0x114/0x1e0 [ 204.310004] SYSC_connect+0x1f6/0x2d0 [ 204.313789] ? SYSC_bind+0x220/0x220 [ 204.317491] ? fput+0xd4/0x150 [ 204.320667] ? SyS_write+0x15e/0x230 [ 204.324365] SyS_connect+0x24/0x30 [ 204.327881] ? SyS_accept+0x30/0x30 [ 204.331487] do_syscall_64+0x1e8/0x640 [ 204.335348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.340176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.345343] RIP: 0033:0x459829 [ 204.348513] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 204.356200] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 204.363452] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 204.370705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.377956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 204.385204] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:36 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 204.481306] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 204.506463] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 204.544814] loop4: p1[EZD] [ 204.568274] loop4: p1 size 2047 extends beyond EOD, truncated [ 204.641368] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 204.734835] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 204.758159] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 204.773761] loop5: p1[EZD] 03:25:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xffffffffffffff5c) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$midi(0x0, 0x7, 0x8001) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x3, r1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) epoll_create1(0x80000) 03:25:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:36 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:36 executing program 3 (fault-call:4 fault-nth:9): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:36 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:36 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 204.887304] FAULT_INJECTION: forcing a failure. [ 204.887304] name failslab, interval 1, probability 0, space 0, times 0 [ 204.911106] 9pnet: Insufficient options for proto=fd [ 204.975129] CPU: 1 PID: 9000 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 204.982191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.991547] Call Trace: [ 204.994144] dump_stack+0x138/0x19c [ 204.997779] should_fail.cold+0x10f/0x159 [ 205.001936] should_failslab+0xdb/0x130 [ 205.005920] kmem_cache_alloc_node+0x287/0x780 [ 205.010518] __alloc_skb+0x9c/0x500 [ 205.014147] ? skb_scrub_packet+0x4b0/0x4b0 [ 205.018472] ? ip6_mtu+0x287/0x410 [ 205.022017] sctp_packet_transmit+0x351/0x3020 [ 205.026601] ? sctp_packet_config+0x614/0x9f0 [ 205.031110] ? __sctp_packet_append_chunk+0x39d/0xb40 [ 205.036303] ? sctp_packet_config+0x9f0/0x9f0 [ 205.040799] ? sctp_packet_append_chunk+0x4f0/0xaf0 [ 205.045819] sctp_outq_flush+0x841/0x31b0 [ 205.049971] ? find_held_lock+0x35/0x130 [ 205.054030] ? perf_trace_itimer_state+0x363/0x640 [ 205.058973] ? __sctp_outq_teardown+0xde0/0xde0 [ 205.063636] ? trace_hardirqs_on_caller+0x400/0x590 [ 205.069301] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 205.069328] sctp_outq_uncork+0x60/0x70 [ 205.086367] sctp_do_sm+0x417/0x4ae0 [ 205.090082] ? save_trace+0x290/0x290 [ 205.093883] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 205.093892] ? find_held_lock+0x35/0x130 [ 205.093902] ? sctp_hash_transport+0xbec/0x1510 [ 205.093917] ? lock_downgrade+0x6e0/0x6e0 [ 205.103922] ? sctp_hash_transport+0xee/0x1510 [ 205.103942] ? memcpy+0x46/0x50 [ 205.103953] ? sctp_assoc_set_primary+0x236/0x2d0 [ 205.112730] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 205.130037] __sctp_connect+0x785/0xc00 [ 205.134012] ? sctp_clear_owner_w+0x120/0x120 [ 205.138510] ? __local_bh_enable_ip+0x99/0x1a0 [ 205.143098] ? trace_hardirqs_on_caller+0x400/0x590 [ 205.148116] ? __local_bh_enable_ip+0x99/0x1a0 [ 205.152697] sctp_connect+0xb8/0x100 [ 205.156450] inet_dgram_connect+0x114/0x1e0 [ 205.160772] SYSC_connect+0x1f6/0x2d0 [ 205.164573] ? SYSC_bind+0x220/0x220 [ 205.168301] ? fput+0xd4/0x150 [ 205.171499] ? SyS_write+0x15e/0x230 [ 205.175215] SyS_connect+0x24/0x30 [ 205.178749] ? SyS_accept+0x30/0x30 [ 205.182380] do_syscall_64+0x1e8/0x640 [ 205.186267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.191117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.196301] RIP: 0033:0x459829 [ 205.199486] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 205.207196] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 205.214462] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 205.221738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.229005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 205.236776] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 205.252217] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 205.263580] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 205.291577] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 205.303325] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 205.340193] loop5: p1[EZD] [ 205.344572] loop4: p1[EZD] [ 205.360990] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 205.387581] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 205.407107] loop4: p1 size 2047 extends beyond EOD, truncated [ 205.413223] loop1: p1[EZD] 03:25:37 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:37 executing program 3 (fault-call:4 fault-nth:10): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:37 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 205.572067] 9pnet: Insufficient options for proto=fd [ 205.575461] FAULT_INJECTION: forcing a failure. [ 205.575461] name failslab, interval 1, probability 0, space 0, times 0 [ 205.646237] CPU: 1 PID: 9046 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 205.653287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.662642] Call Trace: [ 205.665231] dump_stack+0x138/0x19c [ 205.668863] should_fail.cold+0x10f/0x159 [ 205.673021] should_failslab+0xdb/0x130 [ 205.677000] kmem_cache_alloc_trace+0x4b/0x790 [ 205.681578] ? sctp_packet_append_chunk+0x4f0/0xaf0 [ 205.686591] ? sctp_verify_init+0x3f8/0x12c0 [ 205.691000] sctp_association_new+0x6b/0x1e40 [ 205.695496] ? sctp_v6_scope+0x46/0x50 [ 205.699379] sctp_make_temp_asoc+0x9a/0x1d0 [ 205.703697] sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180 [ 205.709406] ? sctp_sf_violation_chunk.isra.0+0x140/0x140 [ 205.714939] ? sctp_sm_lookup_event+0xf7/0x34a [ 205.719524] sctp_sf_do_5_2_1_siminit+0x35/0x40 [ 205.724199] sctp_do_sm+0xfb/0x4ae0 [ 205.727825] ? trace_hardirqs_on+0x10/0x10 [ 205.732058] ? prepare_to_wait_exclusive+0x113/0x340 [ 205.737152] ? save_trace+0x290/0x290 [ 205.737168] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 205.737179] ? trace_hardirqs_on+0x10/0x10 [ 205.751148] ? finish_wait+0x18c/0x260 [ 205.755031] ? save_trace+0x290/0x290 [ 205.758821] ? mark_held_locks+0xb1/0x100 [ 205.758832] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 205.758841] ? find_held_lock+0x35/0x130 [ 205.758851] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 205.775825] ? kvm_clock_read+0x23/0x40 [ 205.779792] ? kvm_clock_get_cycles+0x9/0x10 [ 205.784199] ? ktime_get+0x1ba/0x2c0 [ 205.787928] sctp_assoc_bh_rcv+0x2a0/0x5d0 [ 205.792170] sctp_inq_push+0x1c9/0x260 [ 205.796056] sctp_backlog_rcv+0x116/0x860 [ 205.800203] ? trace_hardirqs_on+0xd/0x10 [ 205.804352] __release_sock+0x12d/0x350 [ 205.808334] release_sock+0x59/0x1b0 [ 205.812047] sctp_connect+0xc8/0x100 [ 205.815758] inet_dgram_connect+0x114/0x1e0 [ 205.820076] SYSC_connect+0x1f6/0x2d0 [ 205.823869] ? SYSC_bind+0x220/0x220 [ 205.827587] ? fput+0xd4/0x150 [ 205.830779] ? SyS_write+0x15e/0x230 [ 205.834494] SyS_connect+0x24/0x30 [ 205.838027] ? SyS_accept+0x30/0x30 [ 205.841654] do_syscall_64+0x1e8/0x640 [ 205.845536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.850377] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.855555] RIP: 0033:0x459829 [ 205.858745] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 205.866451] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 205.873718] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 205.880981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.888246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 205.895513] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 205.930748] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 205.957919] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:38 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0xd0, r1, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80, @dev={0xfe, 0x80, [], 0x19}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x36}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21a7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd52}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x80}, 0x80) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") bind$alg(r2, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x29, @multicast2, 0x4e21, 0x4, 'rr\x00', 0x12, 0x37b1, 0x2a}, 0x2c) mq_unlink(&(0x7f0000000140)='rr\x00') setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b05", 0x10) r4 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r4, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffd17, &(0x7f0000000100)=[{&(0x7f0000000000)=""/48, 0x7510}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x41, &(0x7f0000008bc0)) 03:25:38 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 205.978666] loop1: p1[EZD] [ 205.980755] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 205.991450] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 206.016623] loop5: p1[EZD] 03:25:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 206.057863] IPVS: set_ctl: invalid protocol: 41 224.0.0.2:20001 03:25:38 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:38 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:38 executing program 3 (fault-call:4 fault-nth:11): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 206.228734] 9pnet: Insufficient options for proto=fd 03:25:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 206.290792] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 206.310225] FAULT_INJECTION: forcing a failure. [ 206.310225] name failslab, interval 1, probability 0, space 0, times 0 [ 206.328531] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 206.360853] loop4: p1[EZD] [ 206.376048] loop4: p1 size 2047 extends beyond EOD, truncated [ 206.385842] CPU: 1 PID: 9094 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 206.390499] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 206.392878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.392883] Call Trace: [ 206.392900] dump_stack+0x138/0x19c [ 206.392918] should_fail.cold+0x10f/0x159 [ 206.392933] should_failslab+0xdb/0x130 [ 206.392946] __kmalloc+0x71/0x7a0 [ 206.415983] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 206.417735] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.417749] ? sctp_stream_init+0x83/0x2d0 [ 206.417761] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.417770] ? sctp_stream_init+0x98/0x2d0 [ 206.417781] sctp_stream_init+0x98/0x2d0 [ 206.417794] sctp_association_new+0x10c3/0x1e40 [ 206.428741] loop5: p1[EZD] [ 206.429330] sctp_make_temp_asoc+0x9a/0x1d0 [ 206.444848] sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180 [ 206.444863] ? sctp_sf_violation_chunk.isra.0+0x140/0x140 [ 206.444874] ? sctp_sm_lookup_event+0xf7/0x34a [ 206.444887] sctp_sf_do_5_2_1_siminit+0x35/0x40 [ 206.444898] sctp_do_sm+0xfb/0x4ae0 [ 206.454118] ? trace_hardirqs_on+0x10/0x10 [ 206.470035] ? prepare_to_wait_exclusive+0x113/0x340 [ 206.470065] ? save_trace+0x290/0x290 [ 206.470084] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 206.470096] ? trace_hardirqs_on+0x10/0x10 [ 206.470104] ? finish_wait+0x18c/0x260 [ 206.470114] ? save_trace+0x290/0x290 [ 206.470125] ? mark_held_locks+0xb1/0x100 [ 206.470135] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 206.485912] ? find_held_lock+0x35/0x130 [ 206.485925] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 206.485950] ? kvm_clock_read+0x23/0x40 [ 206.485959] ? kvm_clock_get_cycles+0x9/0x10 [ 206.485970] ? ktime_get+0x1ba/0x2c0 [ 206.503527] sctp_assoc_bh_rcv+0x2a0/0x5d0 03:25:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 206.503548] sctp_inq_push+0x1c9/0x260 [ 206.503562] sctp_backlog_rcv+0x116/0x860 [ 206.503572] ? trace_hardirqs_on+0xd/0x10 [ 206.503588] __release_sock+0x12d/0x350 [ 206.503604] release_sock+0x59/0x1b0 [ 206.503614] sctp_connect+0xc8/0x100 [ 206.503627] inet_dgram_connect+0x114/0x1e0 [ 206.517580] SYSC_connect+0x1f6/0x2d0 [ 206.517591] ? SYSC_bind+0x220/0x220 [ 206.517611] ? fput+0xd4/0x150 [ 206.517621] ? SyS_write+0x15e/0x230 [ 206.517635] SyS_connect+0x24/0x30 [ 206.529410] ? SyS_accept+0x30/0x30 [ 206.529424] do_syscall_64+0x1e8/0x640 [ 206.529433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.529450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.529460] RIP: 0033:0x459829 [ 206.542277] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 206.542289] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 206.542295] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 206.542301] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:38 executing program 3 (fault-call:4 fault-nth:12): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:38 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 206.542307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 206.542313] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:38 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 206.721945] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 206.770356] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 206.791639] loop1: p1[EZD] [ 206.808589] FAULT_INJECTION: forcing a failure. [ 206.808589] name failslab, interval 1, probability 0, space 0, times 0 [ 206.844606] CPU: 0 PID: 9116 Comm: syz-executor.3 Not tainted 4.14.135 #31 [ 206.851659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.860999] Call Trace: [ 206.863573] dump_stack+0x138/0x19c [ 206.867187] should_fail.cold+0x10f/0x159 [ 206.871319] should_failslab+0xdb/0x130 [ 206.875365] __kmalloc+0x71/0x7a0 [ 206.878800] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.884232] ? sctp_stream_init+0x83/0x2d0 [ 206.888451] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.893444] ? sctp_stream_init+0x98/0x2d0 [ 206.897657] sctp_stream_init+0x98/0x2d0 [ 206.901701] sctp_association_new+0x10c3/0x1e40 [ 206.906463] sctp_make_temp_asoc+0x9a/0x1d0 [ 206.910766] sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180 [ 206.916460] ? sctp_sf_violation_chunk.isra.0+0x140/0x140 [ 206.921977] ? sctp_sm_lookup_event+0xf7/0x34a [ 206.926549] sctp_sf_do_5_2_1_siminit+0x35/0x40 [ 206.931202] sctp_do_sm+0xfb/0x4ae0 [ 206.934807] ? trace_hardirqs_on+0x10/0x10 [ 206.939023] ? prepare_to_wait_exclusive+0x113/0x340 [ 206.944126] ? save_trace+0x290/0x290 [ 206.947908] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 206.953858] ? trace_hardirqs_on+0x10/0x10 [ 206.958076] ? finish_wait+0x18c/0x260 [ 206.961943] ? save_trace+0x290/0x290 [ 206.965723] ? mark_held_locks+0xb1/0x100 [ 206.969853] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 206.974242] ? find_held_lock+0x35/0x130 [ 206.978282] ? sctp_assoc_bh_rcv+0x259/0x5d0 [ 206.982677] ? kvm_clock_read+0x23/0x40 [ 206.986630] ? kvm_clock_get_cycles+0x9/0x10 [ 206.991033] ? ktime_get+0x1ba/0x2c0 [ 206.994731] sctp_assoc_bh_rcv+0x2a0/0x5d0 [ 206.998954] sctp_inq_push+0x1c9/0x260 [ 207.002906] sctp_backlog_rcv+0x116/0x860 [ 207.007036] ? trace_hardirqs_on+0xd/0x10 [ 207.011171] __release_sock+0x12d/0x350 [ 207.015130] release_sock+0x59/0x1b0 [ 207.018827] sctp_connect+0xc8/0x100 [ 207.022526] inet_dgram_connect+0x114/0x1e0 [ 207.026829] SYSC_connect+0x1f6/0x2d0 [ 207.030608] ? SYSC_bind+0x220/0x220 [ 207.034305] ? fput+0xd4/0x150 [ 207.037481] ? SyS_write+0x15e/0x230 [ 207.041185] SyS_connect+0x24/0x30 [ 207.044703] ? SyS_accept+0x30/0x30 [ 207.048312] do_syscall_64+0x1e8/0x640 [ 207.052177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.057002] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.062185] RIP: 0033:0x459829 [ 207.066840] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 207.074531] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829 [ 207.081882] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 207.089134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.096381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 207.103631] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 207.131504] IPVS: set_ctl: invalid protocol: 41 224.0.0.2:20001 03:25:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x61) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0/f.le.\x00') readv(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/9, 0x9}], 0x1) renameat(r0, &(0x7f0000000180)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:39 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) [ 207.230750] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 207.276900] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 207.300553] loop5: p1[EZD] [ 207.313179] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 207.324376] 9pnet: Insufficient options for proto=fd 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) 03:25:39 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 207.358628] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 207.405006] loop4: p1[EZD] 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) [ 207.429813] loop4: p1 size 2047 extends beyond EOD, truncated [ 207.456912] audit: type=1400 audit(1564716339.505:56): avc: denied { associate } for pid=9133 comm="syz-executor.2" name="f.le." scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 207.494065] overlayfs: filesystem on './file0' not supported as upperdir [ 207.511022] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0) r2 = accept$netrom(r1, &(0x7f0000000280)={{0x3, @default}, [@bcast, @null, @null, @netrom, @default, @netrom, @bcast, @null]}, &(0x7f0000000100)=0x48) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x404480, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f00000001c0)) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0x4f, 0x4) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)) 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 207.540150] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 207.573611] loop1: p1[EZD] 03:25:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x80) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x100, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:39 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:25:39 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:39 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x5, 0x4000000000000020) tkill(r0, 0x200038) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3, 0x0, 0x1f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 03:25:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:25:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x5, @ipv4={[], [], @loopback}, 0x8001}, {0xa, 0x4e21, 0xffffffffffffff90, @ipv4={[], [], @broadcast}}, 0x2, [0x0, 0x9, 0x100000001, 0x7fff, 0x3, 0x6, 0x7]}, 0x5c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x9, {{0x2, 0x4e21, @loopback}}}, 0x88) 03:25:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000680)=0xff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0), 0xfffffffffffffffd) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB="021704092400000028bd7000fcdbdf2502001000000004d2000004d400000000010015004e23000002000100000004d40507a504010000c008001900000000000a004e22ffff4876ea292ed153b71619ff5ff959aeffff0000000000dd00000000000000000001060000000a004e22000000010000000000000000001effff0000000402000000010017004e210000100018000402760061d9f08be3bcf3a5d4e99931382f0f240e86f88dc0490a4eee75f575862ca4be5de10ffbcd134cfe2a6c22c9dcd945fcd10901dc6ca53e3f623eecd45ba483c1a35f10c4d53b50d647ce89ddf002de81756121c896dd529b86f1413c92aba8465a7697f3d448e59965b45cdbda3a0a3679b3466100000004d5000004d500000000010016004e220000"], 0x120}}, 0x20000000) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='limits\x00') r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(r4, &(0x7f00000001c0)="dc7b6c1098e6cab9ba9a1c421e0855e358d61c543b8587379f1da054ff233f92baaba0f887146d580959b36e1869affeb640b6a41d1bd254606b8fa5a1e42886f888dc416ea914dcf4e5c10f770f4eb3a54b5830667136a62aec86951472d03b7f25d3275c2d8049b2751d5f9c20657c93acbe7cac6fe59959523be4bb4e9dc27a929cf00a9f5822dba244b57d47", 0x8e, 0x100000001, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x20000, 0x0) lstat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') setsockopt$CAIFSO_LINK_SELECT(r4, 0x116, 0x7f, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1) ioprio_set$uid(0x0, 0x0, 0x6be) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000280)=0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000400)={r3, r3, 0x106a1f50, 0xd1, &(0x7f00000008c0)="00a4858f40ce254d349edb1acfe5ed80efb86bd22a4c45b49ed63d0a30ba201e5cff33c0a8c48b2b294eff1b0edfc2f2ecc1fe01a6ec6e264820b88eb532a3a86b9c7f08e58607322fb24b99d6828e886af9973c19ebf9ec0a546d770c12e2e1f016df0181e7167e4e7947344d4fcce9449e33f95dad0db9148b78234c060ff4ac5b0297e5ad6a1c405c8702aa905c2b9f1175b83dc61e00e3a3a5d89b027297c17d9841d7e457229a2e0d4ba2163907bdfcd9019cbcd9f368e78d0b3130cbf3b174f145c632365b40992764d30b4e33bf", 0x9, 0x3f, 0xffffffffffffffe1, 0x20, 0x7ff, 0x2, 0xb4, 'syz0\x00'}) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @bcast, r5}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000006c0)=0x1) write$sndseq(r0, &(0x7f00000005c0)=[{0x2, 0xffffffff80000001, 0x0, 0x5, @tick=0x3, {0xfffffffffffffeff, 0x3}, {0x7b4, 0x10000}, @raw8={"67c73b31b15da66052c24840"}}, {0x0, 0x0, 0x80000001, 0x2, @time={0x77359400}, {0x80000000, 0x6895}, {0x0, 0x7}, @raw8={"0d132ea97bca1d5ace560776"}}, {0x100000001, 0x9, 0xffffffffffff5664, 0x5, @time, {0xce5a, 0x9}, {0xfff, 0x8}, @raw32={[0x100, 0x8, 0x7c]}}, {0x7, 0x80000000, 0x0, 0x3, @time={0x77359400}, {0xb95, 0xb12}, {0xffffffff00000000}, @note={0x0, 0x9, 0xfff, 0x8001, 0x4}}], 0xc0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000180)=0x3, 0x4) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) [ 207.872822] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 207.908627] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 207.971364] loop5: p1[EZD] [ 207.990722] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:40 executing program 5: socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:25:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xa00, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 208.027641] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'teql0\x00', 0x4000}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:40 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 208.072293] loop4: p1[EZD] [ 208.081547] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 208.109660] loop4: p1 size 2047 extends beyond EOD, truncated [ 208.202595] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 208.230507] FAULT_INJECTION: forcing a failure. [ 208.230507] name failslab, interval 1, probability 0, space 0, times 0 03:25:40 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 208.253105] loop1: p1[EZD] [ 208.317475] CPU: 0 PID: 9233 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 208.324546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.333910] Call Trace: [ 208.336509] dump_stack+0x138/0x19c [ 208.340148] should_fail.cold+0x10f/0x159 [ 208.344301] should_failslab+0xdb/0x130 [ 208.348285] kmem_cache_alloc_trace+0x2e9/0x790 [ 208.352964] ? lock_downgrade+0x6e0/0x6e0 [ 208.357116] sctp_association_new+0x6b/0x1e40 [ 208.361623] ? sctp_v6_scope+0x46/0x50 [ 208.365529] __sctp_connect+0x631/0xc00 [ 208.369521] ? sctp_clear_owner_w+0x120/0x120 [ 208.374022] ? __local_bh_enable_ip+0x99/0x1a0 [ 208.378619] ? trace_hardirqs_on_caller+0x400/0x590 [ 208.383648] ? __local_bh_enable_ip+0x99/0x1a0 [ 208.388241] sctp_connect+0xb8/0x100 [ 208.392047] inet_dgram_connect+0x114/0x1e0 [ 208.396370] SYSC_connect+0x1f6/0x2d0 [ 208.400174] ? SYSC_bind+0x220/0x220 [ 208.403902] ? fput+0xd4/0x150 [ 208.407097] ? SyS_write+0x15e/0x230 [ 208.410815] SyS_connect+0x24/0x30 [ 208.414352] ? SyS_accept+0x30/0x30 [ 208.417982] do_syscall_64+0x1e8/0x640 [ 208.421872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.426723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.432023] RIP: 0033:0x459829 [ 208.435207] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 208.442921] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 208.450190] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 208.457462] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_ENDIAN(0x14, 0x1) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = semget$private(0x0, 0x3, 0x30) semop(r1, &(0x7f0000000180)=[{0x0, 0x8, 0x800}, {0x7, 0x5, 0x800}, {0x3, 0x3, 0x800}], 0x3) r2 = dup3(r0, r0, 0x80000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={0x2}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000200)={0x3, 0x2, 0x654, 0x2, 0x0, 0xfffffffffefffff7, 0xfffd}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 208.464738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 208.472007] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:40 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 208.580769] ldm_validate_privheads(): Disk read failed. [ 208.581203] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 208.586335] loop5: p1[EZD] [ 208.609449] loop5: partition table partially beyond EOD, truncated [ 208.616966] loop5: p1 start 1 is beyond EOD, truncated 03:25:40 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:40 executing program 5: socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 208.637019] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xfffffffffffffffe, 0x26}]}, 0x2d8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 208.716202] loop4: p1[EZD] [ 208.730711] FAULT_INJECTION: forcing a failure. [ 208.730711] name failslab, interval 1, probability 0, space 0, times 0 [ 208.752471] loop4: p1 size 2047 extends beyond EOD, truncated [ 208.827924] CPU: 0 PID: 9269 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 208.835006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.844385] Call Trace: [ 208.846992] dump_stack+0x138/0x19c [ 208.850643] should_fail.cold+0x10f/0x159 [ 208.850661] should_failslab+0xdb/0x130 [ 208.850674] __kmalloc+0x2f0/0x7a0 [ 208.850689] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 208.858798] ? sctp_stream_init+0x83/0x2d0 [ 208.858812] ? rcu_read_lock_sched_held+0x110/0x130 [ 208.858820] ? sctp_stream_init+0x98/0x2d0 [ 208.858833] sctp_stream_init+0x98/0x2d0 [ 208.885303] sctp_association_new+0x10c3/0x1e40 [ 208.889983] __sctp_connect+0x631/0xc00 [ 208.893971] ? sctp_clear_owner_w+0x120/0x120 [ 208.898471] ? __local_bh_enable_ip+0x99/0x1a0 [ 208.903052] ? trace_hardirqs_on_caller+0x400/0x590 [ 208.908074] ? __local_bh_enable_ip+0x99/0x1a0 [ 208.912661] sctp_connect+0xb8/0x100 [ 208.916382] inet_dgram_connect+0x114/0x1e0 [ 208.920705] SYSC_connect+0x1f6/0x2d0 [ 208.924483] ? SYSC_bind+0x220/0x220 [ 208.928186] ? fput+0xd4/0x150 [ 208.931362] ? SyS_write+0x15e/0x230 [ 208.935076] SyS_connect+0x24/0x30 [ 208.938595] ? SyS_accept+0x30/0x30 [ 208.942202] do_syscall_64+0x1e8/0x640 [ 208.946071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.950899] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.956065] RIP: 0033:0x459829 [ 208.959245] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 208.966931] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0xc0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000340)={{0x2, 0x0, 0x0, 0x80000001, '\x00', 0x7f}, 0x1, [0xfffffffffffff7ae, 0x7fff, 0x1, 0x6, 0x9000000000, 0x3ff, 0xff, 0x100000001, 0x7fffffff, 0x5, 0x5, 0x9, 0x7fff, 0x2, 0x400, 0x3f, 0x100000, 0x2, 0x4, 0x4, 0x4, 0x0, 0x5, 0x3f, 0xe5, 0x9, 0x6, 0x101, 0xff, 0x8000, 0x8, 0x7, 0x401, 0x20, 0x2, 0x3f, 0x1, 0x8001, 0x8, 0x9, 0xe12, 0x8, 0x5, 0x0, 0x7f, 0x1, 0xfffffffffffffff7, 0x3, 0x20, 0x7, 0x80000001, 0x1000, 0x2a2, 0x3, 0x101, 0x2, 0x8000, 0x1, 0x8, 0x5122, 0x800, 0x5, 0x9, 0x3, 0x0, 0x2, 0x3, 0x5, 0x100000000, 0x1000, 0x4, 0x1, 0xfffffffffffffffa, 0x401, 0xeb, 0x8, 0xc5, 0x1ff, 0x4, 0x1000, 0x1f, 0x9, 0xfffffffffffffffb, 0x0, 0x0, 0x8, 0x401, 0x6311228, 0x9, 0x1, 0x1, 0x2, 0x5, 0x4, 0x7, 0x10000, 0x10000, 0x1, 0xfff, 0x15, 0x800, 0x6, 0x7, 0x9, 0x4, 0x6, 0x7, 0x3ff, 0xffffffff, 0x4, 0x44, 0x5, 0x4, 0x20000, 0x1, 0x0, 0x200, 0x0, 0x1000, 0x6, 0x2, 0x8, 0x0, 0xaa, 0x1, 0x9, 0x5, 0x8], {0x77359400}}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x80000000, @loopback}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0xffffffffffffff29, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000180)=""/89) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x0, 0x7ff, 0x58, 0x1}, {0x4, 0x0, 0xdb, 0x7}]}) 03:25:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = dup(r0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x28}, 0x1ff}, @in6={0xa, 0x4e23, 0x8, @remote}, @in={0x2, 0x4e20, @local}], 0x58) r2 = fcntl$dupfd(r0, 0x0, r0) write$selinux_attr(r2, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990) [ 208.974179] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 208.981429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.988686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 208.995938] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 209.021381] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 209.033095] ldm_validate_privheads(): Disk read failed. [ 209.038601] loop5: p1[EZD] [ 209.038611] loop5: partition table partially beyond EOD, truncated [ 209.053013] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 209.066163] loop5: p1 start 1 is beyond EOD, truncated 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000000c0)=""/227, &(0x7f0000000000)=0xe3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000001c0)={0x9, [0xea, 0x7, 0x2, 0x7d9, 0xfffffffffffffffc, 0xf3, 0x200, 0x4, 0x40]}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 209.094478] loop1: p1[EZD] 03:25:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000900)="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", 0x116, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40300, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000100)={r3, 0x2}) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000640)="4090ff07afb4ced385d3b23d15e5b0", 0xf, r0) write$FUSE_GETXATTR(r2, &(0x7f0000000240)={0x18, 0xfffffffffffffff5, 0x5, {0x3}}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r1, r4}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x0, 0x8}, 0xfffffe7b) sysfs$2(0x2, 0x401, 0x0) 03:25:41 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:41 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 5: socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000000c0)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="3a00000006000000000000000000000003000000000000000300000000000000110000000000000076628af4b0061b7c8f6f786e657431636772"], 0x3a) [ 209.244800] FAULT_INJECTION: forcing a failure. [ 209.244800] name failslab, interval 1, probability 0, space 0, times 0 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}, @in6={0xa, 0x4e24, 0xc0f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in={0x2, 0xfffffffffffffff8, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xbd08) [ 209.354801] CPU: 0 PID: 9310 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 209.361861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.361866] Call Trace: [ 209.361883] dump_stack+0x138/0x19c [ 209.361902] should_fail.cold+0x10f/0x159 [ 209.361918] should_failslab+0xdb/0x130 [ 209.385585] __kmalloc+0x2f0/0x7a0 [ 209.389119] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 209.389132] ? sctp_stream_init+0x83/0x2d0 [ 209.389143] ? rcu_read_lock_sched_held+0x110/0x130 [ 209.389152] ? sctp_stream_init+0x98/0x2d0 [ 209.389165] sctp_stream_init+0x98/0x2d0 [ 209.389179] sctp_association_new+0x10c3/0x1e40 [ 209.416770] __sctp_connect+0x631/0xc00 [ 209.420760] ? sctp_clear_owner_w+0x120/0x120 [ 209.425255] ? __local_bh_enable_ip+0x99/0x1a0 [ 209.425270] ? trace_hardirqs_on_caller+0x400/0x590 [ 209.425282] ? __local_bh_enable_ip+0x99/0x1a0 [ 209.425297] sctp_connect+0xb8/0x100 [ 209.425310] inet_dgram_connect+0x114/0x1e0 [ 209.425321] SYSC_connect+0x1f6/0x2d0 [ 209.434896] ? SYSC_bind+0x220/0x220 [ 209.434916] ? fput+0xd4/0x150 [ 209.434928] ? SyS_write+0x15e/0x230 [ 209.434942] SyS_connect+0x24/0x30 [ 209.434950] ? SyS_accept+0x30/0x30 [ 209.461894] do_syscall_64+0x1e8/0x640 [ 209.461906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.461924] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.461933] RIP: 0033:0x459829 [ 209.461938] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 209.461948] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 209.461953] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 209.461958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.461963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 209.461970] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$tipc(0x1e, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000000)) inotify_init1(0x80800) [ 209.581070] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 209.591227] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 209.601151] ldm_validate_privheads(): Disk read failed. [ 209.610255] loop5: p1[EZD] [ 209.619424] loop5: partition table partially beyond EOD, truncated 03:25:41 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000300)={0x0, 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) [ 209.627477] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 209.633607] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 209.654117] loop1: p1[EZD] [ 209.657278] loop4: p1[EZD] [ 209.666529] loop5: p1 start 1 is beyond EOD, truncated [ 209.675936] loop4: p1 size 2047 extends beyond EOD, truncated 03:25:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x200) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 209.726298] FAULT_INJECTION: forcing a failure. [ 209.726298] name failslab, interval 1, probability 0, space 0, times 0 03:25:41 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x31, 0x0, &(0x7f0000000140)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x802, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7, 0x6, 0x6, 0x8000}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x40000) [ 209.851527] CPU: 1 PID: 9348 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 209.858591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.867950] Call Trace: [ 209.870551] dump_stack+0x138/0x19c [ 209.874193] should_fail.cold+0x10f/0x159 [ 209.878355] should_failslab+0xdb/0x130 [ 209.882343] kmem_cache_alloc_trace+0x2e9/0x790 [ 209.887024] ? __ipv6_addr_type+0x199/0x28f [ 209.891390] sctp_add_bind_addr+0x6d/0x360 [ 209.895632] sctp_copy_one_addr+0xf9/0x120 [ 209.899858] sctp_bind_addr_copy+0xfc/0x294 [ 209.904164] sctp_assoc_set_bind_addr_from_ep+0x13a/0x190 [ 209.909686] __sctp_connect+0x652/0xc00 [ 209.913649] ? sctp_clear_owner_w+0x120/0x120 [ 209.918129] ? __local_bh_enable_ip+0x99/0x1a0 [ 209.922693] ? trace_hardirqs_on_caller+0x400/0x590 [ 209.927693] ? __local_bh_enable_ip+0x99/0x1a0 [ 209.932267] sctp_connect+0xb8/0x100 [ 209.935964] inet_dgram_connect+0x114/0x1e0 [ 209.940269] SYSC_connect+0x1f6/0x2d0 [ 209.944053] ? SYSC_bind+0x220/0x220 [ 209.947756] ? fput+0xd4/0x150 [ 209.950928] ? SyS_write+0x15e/0x230 [ 209.954626] SyS_connect+0x24/0x30 [ 209.958169] ? SyS_accept+0x30/0x30 [ 209.961782] do_syscall_64+0x1e8/0x640 [ 209.965652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.970482] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.975657] RIP: 0033:0x459829 [ 209.978830] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 209.986520] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 209.993770] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 210.001021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.008277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 210.015539] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000040)=0xa) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x74}}}, &(0x7f0000000180)=0x84) 03:25:42 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x2000) socket$rds(0x15, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000200)) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xffffff62) 03:25:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x24) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={r2, 0x62, "cdb90e5bdd33b3b4891dec824ef5c23c93d6378d4e8e5221a24a58b1e17cb0071e79b0b49c3feab7672377560a6d8924b85f812a4b8d5a2a10a1775a7c97c8c55124c58f66db4c67aa7362589e166431884536ae63e5fa4f309f7003eb3753bf354e"}, &(0x7f0000000200)=0x6a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:42 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[], 0x2f5) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 210.191102] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 210.200696] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 210.210971] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 210.226798] FAULT_INJECTION: forcing a failure. [ 210.226798] name failslab, interval 1, probability 0, space 0, times 0 [ 210.237325] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 210.247397] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 210.256495] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 210.267258] CPU: 1 PID: 9392 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 210.274301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.283661] Call Trace: [ 210.284979] loop5: p1[EZD] [ 210.286257] dump_stack+0x138/0x19c [ 210.286281] should_fail.cold+0x10f/0x159 [ 210.289281] loop1: p1[EZD] [ 210.292827] should_failslab+0xdb/0x130 [ 210.292842] kmem_cache_alloc_trace+0x2e9/0x790 [ 210.292856] ? __ipv6_addr_type+0x199/0x28f [ 210.292872] sctp_add_bind_addr+0x6d/0x360 [ 210.292887] sctp_copy_one_addr+0xf9/0x120 [ 210.292901] sctp_bind_addr_copy+0xfc/0x294 [ 210.308586] sctp_assoc_set_bind_addr_from_ep+0x13a/0x190 [ 210.308601] __sctp_connect+0x652/0xc00 [ 210.313044] loop4: p1[EZD] 03:25:42 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x9, 0x28}, {0x1ff, 0x5}, 0x7, 0x3, 0x6}) flock(r0, 0x1) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) munlockall() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000180)) [ 210.317143] ? sctp_clear_owner_w+0x120/0x120 [ 210.317155] ? __local_bh_enable_ip+0x99/0x1a0 [ 210.317168] ? trace_hardirqs_on_caller+0x400/0x590 [ 210.331213] ? __local_bh_enable_ip+0x99/0x1a0 [ 210.331226] sctp_connect+0xb8/0x100 [ 210.331238] inet_dgram_connect+0x114/0x1e0 [ 210.331249] SYSC_connect+0x1f6/0x2d0 [ 210.331258] ? SYSC_bind+0x220/0x220 [ 210.331274] ? fput+0xd4/0x150 [ 210.338148] ? SyS_write+0x15e/0x230 [ 210.338165] SyS_connect+0x24/0x30 [ 210.338174] ? SyS_accept+0x30/0x30 [ 210.347220] do_syscall_64+0x1e8/0x640 [ 210.356778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.356796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.356806] RIP: 0033:0x459829 [ 210.368596] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 210.368608] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 210.368614] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 210.368620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.368625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 03:25:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @multicast1}, 0x64, r1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7f, 0x200000) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000200)="4f468caeec280ec7b5d39914d604627e54d473ec70c74660", 0x18) ioctl$TIOCSCTTY(r2, 0x540e, 0xd17) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 210.368632] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 210.449393] loop4: p1 size 2047 extends beyond EOD, truncated 03:25:42 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:42 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:42 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="716e6f000000616c6c6f632c002646913937c0f19adf3b18d6c926d1da268f7317aaaf37903afce56f105be30b582bc0ed34d68f9306aae3835709f5443426c5d2901914df6a0768d71cdf61fb853beafdbf414b2abd0a1b22adf28f2364284544f97bfc30"]) 03:25:42 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={0x4}, &(0x7f0000000040), 0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x840, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x3e9a5c31}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x1}}], [{@obj_type={'obj_type', 0x3d, 'selinux'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_lt={'euid<', r1}}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 210.577902] FAULT_INJECTION: forcing a failure. [ 210.577902] name failslab, interval 1, probability 0, space 0, times 0 [ 210.625270] CPU: 0 PID: 9412 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 210.632338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.632344] Call Trace: [ 210.632362] dump_stack+0x138/0x19c [ 210.632381] should_fail.cold+0x10f/0x159 [ 210.632391] ? find_held_lock+0x35/0x130 [ 210.632405] should_failslab+0xdb/0x130 [ 210.632418] kmem_cache_alloc_node+0x56/0x780 [ 210.632434] ? find_held_lock+0x35/0x130 [ 210.632453] __alloc_skb+0x9c/0x500 [ 210.632467] ? skb_scrub_packet+0x4b0/0x4b0 [ 210.652283] ? sctp_bind_addrs_to_raw+0x200/0x320 [ 210.652296] _sctp_make_chunk+0x51/0x270 [ 210.685681] ? ipv6_dev_get_saddr+0x33f/0x9b0 [ 210.690184] sctp_make_control+0x35/0x150 [ 210.694320] sctp_make_init+0x5e9/0xad0 [ 210.698381] ? sctp_init_cause+0xd0/0xd0 [ 210.702431] ? __lock_acquire+0x5f7/0x4620 [ 210.706648] ? __lock_acquire+0x5f7/0x4620 [ 210.710866] ? trace_hardirqs_on+0x10/0x10 [ 210.715084] ? xfrm_policy_lookup+0x70/0x70 [ 210.719388] ? sctp_sm_lookup_event+0xf7/0x34a [ 210.723954] sctp_sf_do_prm_asoc+0xc2/0x350 [ 210.728257] sctp_do_sm+0xfb/0x4ae0 [ 210.731875] ? save_trace+0x290/0x290 [ 210.735654] ? save_trace+0x290/0x290 [ 210.739445] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 210.745495] ? find_held_lock+0x35/0x130 [ 210.749541] ? sctp_hash_transport+0xbec/0x1510 [ 210.754196] ? lock_downgrade+0x6e0/0x6e0 [ 210.758330] ? sctp_hash_transport+0xee/0x1510 [ 210.762895] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 210.768444] ? memcpy+0x46/0x50 [ 210.771705] ? sctp_assoc_set_primary+0x236/0x2d0 [ 210.776531] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 210.781183] __sctp_connect+0x785/0xc00 [ 210.785146] ? sctp_clear_owner_w+0x120/0x120 [ 210.789626] ? __local_bh_enable_ip+0x99/0x1a0 [ 210.794191] ? trace_hardirqs_on_caller+0x400/0x590 [ 210.799190] ? __local_bh_enable_ip+0x99/0x1a0 [ 210.803779] sctp_connect+0xb8/0x100 [ 210.807479] inet_dgram_connect+0x114/0x1e0 [ 210.811783] SYSC_connect+0x1f6/0x2d0 [ 210.815563] ? SYSC_bind+0x220/0x220 [ 210.819265] ? fput+0xd4/0x150 [ 210.822441] ? SyS_write+0x15e/0x230 [ 210.826152] SyS_connect+0x24/0x30 [ 210.829671] ? SyS_accept+0x30/0x30 [ 210.833283] do_syscall_64+0x1e8/0x640 [ 210.837171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.842000] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.847173] RIP: 0033:0x459829 [ 210.850344] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 210.858050] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 210.865301] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 210.872551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.879802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 210.887051] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:42 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="26000000130047f10701c1b00ef900000700000000ffffdf09ef18ffff0809b58ac51cfbfa35", 0x26) mmap(&(0x7f0000f95000/0x1000)=nil, 0x1000, 0x1, 0x31, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000f95fd7)={0x0, 0xf, 0x0, 0xfffffffffffffeba}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x4000000000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) epoll_create(0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) ioctl$VHOST_SET_VRING_NUM(r4, 0x4008af10, &(0x7f0000000040)={0x3, 0x9}) [ 210.924539] XFS (loop2): unknown mount option [qno]. [ 210.984733] XFS (loop2): unknown mount option [qno]. [ 211.001202] ldm_validate_privheads(): Disk read failed. [ 211.008751] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 211.009424] loop5: p1[EZD] [ 211.018591] ldm_validate_privheads(): Disk read failed. [ 211.025057] loop4: p1[EZD] 03:25:43 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40, 0xa0) bind$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x3f, {0xfffffffffffffff9, 0x8, 0x3ff, 0x2, 0x2, 0x5246}, 0xfffffffffffffffb, 0x6}, 0xe) r1 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000000)={0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 211.032104] loop4: partition table partially beyond EOD, truncated [ 211.041729] FAULT_INJECTION: forcing a failure. [ 211.041729] name failslab, interval 1, probability 0, space 0, times 0 [ 211.053184] loop5: partition table partially beyond EOD, truncated [ 211.058651] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 211.067045] CPU: 1 PID: 9447 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 211.074064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.074069] Call Trace: [ 211.074086] dump_stack+0x138/0x19c [ 211.074105] should_fail.cold+0x10f/0x159 [ 211.074119] should_failslab+0xdb/0x130 [ 211.074133] kmem_cache_alloc_node_trace+0x5a/0x770 [ 211.074145] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 211.074158] __kmalloc_node_track_caller+0x3d/0x80 [ 211.074172] __kmalloc_reserve.isra.0+0x40/0xe0 [ 211.074183] __alloc_skb+0xcf/0x500 [ 211.074193] ? skb_scrub_packet+0x4b0/0x4b0 [ 211.074204] ? sctp_bind_addrs_to_raw+0x200/0x320 [ 211.074216] _sctp_make_chunk+0x51/0x270 [ 211.074228] ? ipv6_dev_get_saddr+0x33f/0x9b0 [ 211.139225] sctp_make_control+0x35/0x150 [ 211.143361] sctp_make_init+0x5e9/0xad0 [ 211.147325] ? sctp_init_cause+0xd0/0xd0 [ 211.151370] ? __lock_acquire+0x5f7/0x4620 [ 211.155585] ? __lock_acquire+0x5f7/0x4620 [ 211.159803] ? trace_hardirqs_on+0x10/0x10 [ 211.164022] ? xfrm_policy_lookup+0x70/0x70 [ 211.168326] ? sctp_sm_lookup_event+0xf7/0x34a [ 211.172895] sctp_sf_do_prm_asoc+0xc2/0x350 [ 211.177202] sctp_do_sm+0xfb/0x4ae0 [ 211.180811] ? save_trace+0x290/0x290 [ 211.184592] ? save_trace+0x290/0x290 [ 211.188380] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 211.194334] ? find_held_lock+0x35/0x130 [ 211.198381] ? sctp_hash_transport+0xbec/0x1510 [ 211.203042] ? lock_downgrade+0x6e0/0x6e0 [ 211.207177] ? sctp_hash_transport+0xee/0x1510 [ 211.211743] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 211.217269] ? memcpy+0x46/0x50 [ 211.220534] ? sctp_assoc_set_primary+0x236/0x2d0 [ 211.225363] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 211.230022] __sctp_connect+0x785/0xc00 [ 211.234450] ? sctp_clear_owner_w+0x120/0x120 [ 211.238933] ? __local_bh_enable_ip+0x99/0x1a0 [ 211.243503] ? trace_hardirqs_on_caller+0x400/0x590 [ 211.248506] ? __local_bh_enable_ip+0x99/0x1a0 [ 211.253076] sctp_connect+0xb8/0x100 [ 211.256776] inet_dgram_connect+0x114/0x1e0 [ 211.261094] SYSC_connect+0x1f6/0x2d0 [ 211.264884] ? SYSC_bind+0x220/0x220 [ 211.268591] ? fput+0xd4/0x150 [ 211.271765] ? SyS_write+0x15e/0x230 [ 211.275464] SyS_connect+0x24/0x30 [ 211.278985] ? SyS_accept+0x30/0x30 [ 211.282602] do_syscall_64+0x1e8/0x640 [ 211.286471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.291305] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.296479] RIP: 0033:0x459829 [ 211.299657] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 211.307353] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 211.314609] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 211.321865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.329120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 211.336373] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 211.345800] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 211.355716] loop4: p1 start 1 is beyond EOD, truncated [ 211.361653] loop5: p1 start 1 is beyond EOD, truncated [ 211.365750] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:43 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:43 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 211.395674] loop1: p1[EZD] 03:25:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x8000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000480)=ANY=[@ANYBLOB="070000000000000008000000010000000000000000000000030000000200000005000000000000000000000000000000000000000000000007000000020000000000000000000000080000000000000001000000000000002505000000000000700c0000000000000500000005000000000000000000000009000000000000000000008000000000240f00000000000003000000810000000000000003000000000000000000000000000000070000000000000000000000000000000000200000000000000000000000000003000000000000000000000002000000800000000000000000000000000000000000000000000000000000000500000000000000000000000000000069000000000000000500000000000000ffffffff0000000003060000ff070000018000000700000000000000000000002d030000ffffffff00000000000000000000000000000000000000000000000068d46c2b4cb61496dd"]) select(0x40, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x34, 0xcd1e, 0x3ff, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000000c0)={0x2, 0x5, 0x7, 0x544c, 0x10000, 0x7, 0x7, 0x3a65}, &(0x7f0000000100)={0x7, 0xfff, 0x890, 0x9, 0x5, 0x40, 0xffffffffffffff80, 0x7}, &(0x7f0000000140)={0x0, 0x7530}) r3 = dup(r2) fcntl$getownex(r3, 0x10, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x4c81, 0xfffffffffffffffe) select(0x40, &(0x7f00000001c0)={0x7494, 0x5, 0x8, 0x9, 0x5, 0xc4b5, 0xeed, 0x6}, &(0x7f0000000200)={0x8, 0x3ff, 0x3f, 0x8, 0x49, 0x9, 0x7fff}, &(0x7f0000000240)={0xf9cc, 0x8, 0x53eb2a5c, 0x4, 0x8d89, 0x9585, 0x6, 0x8}, &(0x7f0000000280)={0x77359400}) 03:25:43 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x400) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000180)={0x0, r2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:43 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 211.548095] FAULT_INJECTION: forcing a failure. [ 211.548095] name failslab, interval 1, probability 0, space 0, times 0 [ 211.565179] CPU: 0 PID: 9477 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 211.572342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.581691] Call Trace: [ 211.584275] dump_stack+0x138/0x19c [ 211.587889] should_fail.cold+0x10f/0x159 [ 211.592028] should_failslab+0xdb/0x130 [ 211.595987] kmem_cache_alloc_node_trace+0x5a/0x770 [ 211.600993] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 211.606431] __kmalloc_node_track_caller+0x3d/0x80 [ 211.611353] __kmalloc_reserve.isra.0+0x40/0xe0 [ 211.616007] __alloc_skb+0xcf/0x500 [ 211.619625] ? skb_scrub_packet+0x4b0/0x4b0 [ 211.623933] ? sctp_bind_addrs_to_raw+0x200/0x320 [ 211.628765] _sctp_make_chunk+0x51/0x270 [ 211.632810] ? ipv6_dev_get_saddr+0x33f/0x9b0 [ 211.637292] sctp_make_control+0x35/0x150 [ 211.641423] sctp_make_init+0x5e9/0xad0 [ 211.645387] ? sctp_init_cause+0xd0/0xd0 [ 211.649438] ? __lock_acquire+0x5f7/0x4620 [ 211.653653] ? __lock_acquire+0x5f7/0x4620 [ 211.657870] ? trace_hardirqs_on+0x10/0x10 [ 211.662091] ? xfrm_policy_lookup+0x70/0x70 [ 211.666399] ? sctp_sm_lookup_event+0xf7/0x34a [ 211.671049] sctp_sf_do_prm_asoc+0xc2/0x350 [ 211.675356] sctp_do_sm+0xfb/0x4ae0 [ 211.678966] ? save_trace+0x290/0x290 [ 211.682745] ? save_trace+0x290/0x290 [ 211.686710] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 211.692660] ? find_held_lock+0x35/0x130 [ 211.696709] ? sctp_hash_transport+0xbec/0x1510 [ 211.701363] ? lock_downgrade+0x6e0/0x6e0 [ 211.705497] ? sctp_hash_transport+0xee/0x1510 [ 211.710168] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 211.715691] ? memcpy+0x46/0x50 [ 211.718957] ? sctp_assoc_set_primary+0x236/0x2d0 [ 211.723786] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 211.728442] __sctp_connect+0x785/0xc00 [ 211.732407] ? sctp_clear_owner_w+0x120/0x120 [ 211.736899] ? __local_bh_enable_ip+0x99/0x1a0 [ 211.741468] ? trace_hardirqs_on_caller+0x400/0x590 [ 211.746465] ? __local_bh_enable_ip+0x99/0x1a0 [ 211.751033] sctp_connect+0xb8/0x100 [ 211.754735] inet_dgram_connect+0x114/0x1e0 [ 211.759044] SYSC_connect+0x1f6/0x2d0 [ 211.762831] ? SYSC_bind+0x220/0x220 [ 211.766534] ? fput+0xd4/0x150 [ 211.769713] ? SyS_write+0x15e/0x230 [ 211.773427] SyS_connect+0x24/0x30 [ 211.776950] ? SyS_accept+0x30/0x30 [ 211.780562] do_syscall_64+0x1e8/0x640 [ 211.784433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.789280] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.794455] RIP: 0033:0x459829 03:25:43 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 211.797630] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 211.805342] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 211.812596] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 211.819850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.827104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 211.834364] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 03:25:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r1, 0x1c, &(0x7f00000000c0)={0x10, 0x8, 0x7fffffff}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 211.959436] FAULT_INJECTION: forcing a failure. [ 211.959436] name failslab, interval 1, probability 0, space 0, times 0 [ 211.971686] CPU: 1 PID: 9495 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 211.978729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.988081] Call Trace: [ 211.990665] dump_stack+0x138/0x19c [ 211.994285] should_fail.cold+0x10f/0x159 [ 211.998421] should_failslab+0xdb/0x130 [ 212.002381] kmem_cache_alloc_node+0x287/0x780 [ 212.006952] __alloc_skb+0x9c/0x500 [ 212.010561] ? skb_scrub_packet+0x4b0/0x4b0 [ 212.014867] ? ip6_mtu+0x287/0x410 [ 212.018397] sctp_packet_transmit+0x351/0x3020 [ 212.022965] ? sctp_packet_config+0x614/0x9f0 [ 212.027460] ? __sctp_packet_append_chunk+0x39d/0xb40 [ 212.032634] ? sctp_packet_config+0x9f0/0x9f0 [ 212.037128] ? sctp_packet_append_chunk+0x4f0/0xaf0 [ 212.042131] sctp_outq_flush+0x841/0x31b0 [ 212.046263] ? find_held_lock+0x35/0x130 [ 212.050307] ? perf_trace_itimer_state+0x363/0x640 [ 212.055228] ? __sctp_outq_teardown+0xde0/0xde0 [ 212.059879] ? trace_hardirqs_on_caller+0x400/0x590 [ 212.064881] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 212.069974] sctp_outq_uncork+0x60/0x70 [ 212.073932] sctp_do_sm+0x417/0x4ae0 [ 212.077628] ? save_trace+0x290/0x290 [ 212.081416] ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0 [ 212.087547] ? find_held_lock+0x35/0x130 [ 212.091596] ? sctp_hash_transport+0xbec/0x1510 [ 212.096340] ? lock_downgrade+0x6e0/0x6e0 [ 212.100480] ? sctp_hash_transport+0xee/0x1510 [ 212.105059] ? memcpy+0x46/0x50 [ 212.108324] ? sctp_assoc_set_primary+0x236/0x2d0 [ 212.113151] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 212.117810] __sctp_connect+0x785/0xc00 [ 212.121772] ? sctp_clear_owner_w+0x120/0x120 [ 212.126269] ? __local_bh_enable_ip+0x99/0x1a0 [ 212.130837] ? trace_hardirqs_on_caller+0x400/0x590 [ 212.135840] ? __local_bh_enable_ip+0x99/0x1a0 [ 212.140407] sctp_connect+0xb8/0x100 [ 212.144106] inet_dgram_connect+0x114/0x1e0 [ 212.148422] SYSC_connect+0x1f6/0x2d0 [ 212.152217] ? SYSC_bind+0x220/0x220 [ 212.155919] ? fput+0xd4/0x150 [ 212.159096] ? SyS_write+0x15e/0x230 [ 212.162804] SyS_connect+0x24/0x30 [ 212.166325] ? SyS_accept+0x30/0x30 [ 212.169934] do_syscall_64+0x1e8/0x640 [ 212.173808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.178649] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.183825] RIP: 0033:0x459829 [ 212.186996] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 212.194689] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829 [ 212.201942] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 212.209195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.216449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 212.223705] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004 [ 212.237494] ldm_validate_privheads(): Disk read failed. 03:25:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000140)="19df91859a1f60ef68a2ccaad72204efd276a27685b0cc0bae56ea958fa24049eb9be9638f70d4262fd912c6a8309c2e27020f5820a95efc6acd3a037e7f0910cfd4a356c30e1a4ae13fb5a10f06de0d8631b8be6f9ad26385cc1c5c58", 0x5d, 0xfffffffffffffffe}, {&(0x7f00000001c0)="d7b2d354c3fb8905aab68cfea809d9bfc1c9492b9ba209bd4a7165d3dc796758bc728048fd343fbac83abbae579f0a2748a1b1c10b27a2de874eba3de1bb8e176d7468020a3a62f916cb022b74e828d0ee8fa98816cae63bfb42d3a311f413525ea232c030dce01d597f76885fe567bab7d712583cc6c8463bee", 0x7a, 0x2}, {&(0x7f0000000240)="21acd1aae0b40ad8bd8a1e216417c88777d0bb848d8b44ea8df2267466e001dfda564f4e1332628678487f13a8a247c0887338e1f5131f4d9c9be39658c166bab1d1937b4f3150fee7d1ca9e5264ff86b5b945", 0x53, 0x7fff}, {&(0x7f00000002c0)="f6a8befe94b6636482b301e8cf4c829142abe0e950ea3c6486658f542a1d1fc1bb821b6aed4542c230fdaf6d3da1e8694ca86349fe96a1e6456653a2b8a4bbebc24a", 0x42, 0xffffffffffffffc0}], 0x22002, &(0x7f00000003c0)={[{@noinline_dentry='noinline_dentry'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x5}}, {@whint_mode_user='whint_mode=user-based'}, {@disable_roll_forward='disable_roll_forward'}], [{@obj_type={'obj_type', 0x3d, '/'}}, {@smackfsdef={'smackfsdef'}}, {@smackfsdef={'smackfsdef', 0x3d, 'posix_acl_access'}}, {@subj_user={'subj_user', 0x3d, 'vmnet1'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:25:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 212.255772] ldm_validate_privheads(): Disk read failed. [ 212.265278] loop4: p1[EZD] [ 212.269284] loop5: p1[EZD] [ 212.286893] loop5: partition table partially beyond EOD, truncated [ 212.293875] loop4: partition table partially beyond EOD, truncated 03:25:44 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 212.322205] loop5: p1 start 1 is beyond EOD, truncated [ 212.328447] loop4: p1 start 1 is beyond EOD, truncated [ 212.342960] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:44 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 212.395314] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:44 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80, 0x0) shutdown(r0, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x51a, 0x4, &(0x7f0000000200)=[{&(0x7f0000000340)="2d53d8737051e108c85cf159b311aac5777b16c865d44f18e2972053b85f153a1b0dc87ebfc8ea9561cb58af7738736f794995c6260b1e0d0d0e89682a2fb407354a5ca5b1d2aa709bdae6ca0bd6cf934247d5f8ca6783d276393406c8055d129a9686fbe9136bd884a7dc1d306db0aaf0258879b693a25bc1ed9a848cffc9b31d95ad40b82193885d820a226932", 0x8e, 0x1}, {&(0x7f0000000400)="07bbaf5568504e2342be84c799776cebbcbe80c4e5f7d43fb28d9b12bcb968087d2f3b147d92a15afa0e694a5547ef992a44e3f3b37a6495d64efe670bdc4880830fb73b5eb8835ce0cc6dd9669e53b9215d5d09fd570de45aa71d709405bb72e63f7703d52e93cde85066d9c6ae4e7c57644cd6a59c6f30c0de70df8694c86af135ae77774db908ab469a465e469cd80ab188bc872ff99286e4cde4ca3d9e0e8da0c438f575789b3ff6f2bdc7c2c76ddb2f535f77b073c51af76950f4ea6e446ba6eb306026f4addba0730e3c30f77109dcb51bd4a339d62fb215", 0xdb, 0x20}, {&(0x7f0000000500)="885ffd3a858bf3df68731c06a2a69895e38b1b4c6b264c5aefad6b15255aef1a531af582362eb1b11fec4c61285d1db5c358f781bd52855b51c266f05744cdb37575e4829ee2ceb375dd4483b44237b35155b775c0709cfb2ffcacbf585780287ce01724f286cb3d9df22cb98e9c10a68b964e60046c6c9432e7bd3959f5e6b8d0f0054f7ae00550b90f55bc21698434631fbb54052aabad7dce22daa97620f776ceba43458b4730e800f7e13e2491eba1f3d9925c295cb96efa96c60190f1ebdb3303334cb79e81527687ee2dd945d95df1df6f2ee87a8a963a9b55be8804d42771987380a825bd29685ac026746e4822bada0658", 0xf5, 0x7}, {&(0x7f0000000600)="c022bf4c3b285c98eb69cd23a5c4c747aef1799a4d37d736adf4053c742f992825afb4a71f4cb54b00725b96b6945f3dbf95f6c9001d25cc51ca70f98618b6b3e4fad356eac920fcdfcfec1ce14dab7a5c30c9758f92a6513348d3f43bef94d8251003244dd5e2b63e748d32a86fb5ce52e0b403339f4949f0d23aab49b8ce33743ef178f7dab9911f8833050b9ed279f8d9b9cbb0a530b8dd16f3c10a2218d2ec5c7e01c7057ab5636f7500f56d674c1f8d6ad371db64909143f2520d30807bf0f65fefa32550b95ec902c2", 0xcc, 0x7fffffff}], 0x820, &(0x7f0000000700)={[{@barrier='barrier'}, {@nossd_spread='nossd_spread'}, {@subvolid={'subvolid', 0x3d, 0x28ed}}, {@compress='compress'}, {@nodatasum='nodatasum'}, {@noinode_cache='noinode_cache'}], [{@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000002c0)={0x7, 0x4}) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) capget(&(0x7f00000000c0)={0x19980330, r2}, &(0x7f0000000100)={0x3, 0x0, 0x8d60, 0x6, 0x5, 0x8000}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 212.443373] loop1: p1[EZD] 03:25:44 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000140)="19df91859a1f60ef68a2ccaad72204efd276a27685b0cc0bae56ea958fa24049eb9be9638f70d4262fd912c6a8309c2e27020f5820a95efc6acd3a037e7f0910cfd4a356c30e1a4ae13fb5a10f06de0d8631b8be6f9ad26385cc1c5c58", 0x5d, 0xfffffffffffffffe}, {&(0x7f00000001c0)="d7b2d354c3fb8905aab68cfea809d9bfc1c9492b9ba209bd4a7165d3dc796758bc728048fd343fbac83abbae579f0a2748a1b1c10b27a2de874eba3de1bb8e176d7468020a3a62f916cb022b74e828d0ee8fa98816cae63bfb42d3a311f413525ea232c030dce01d597f76885fe567bab7d712583cc6c8463bee", 0x7a, 0x2}, {&(0x7f0000000240)="21acd1aae0b40ad8bd8a1e216417c88777d0bb848d8b44ea8df2267466e001dfda564f4e1332628678487f13a8a247c0887338e1f5131f4d9c9be39658c166bab1d1937b4f3150fee7d1ca9e5264ff86b5b945", 0x53, 0x7fff}, {&(0x7f00000002c0)="f6a8befe94b6636482b301e8cf4c829142abe0e950ea3c6486658f542a1d1fc1bb821b6aed4542c230fdaf6d3da1e8694ca86349fe96a1e6456653a2b8a4bbebc24a", 0x42, 0xffffffffffffffc0}], 0x22002, &(0x7f00000003c0)={[{@noinline_dentry='noinline_dentry'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x5}}, {@whint_mode_user='whint_mode=user-based'}, {@disable_roll_forward='disable_roll_forward'}], [{@obj_type={'obj_type', 0x3d, '/'}}, {@smackfsdef={'smackfsdef'}}, {@smackfsdef={'smackfsdef', 0x3d, 'posix_acl_access'}}, {@subj_user={'subj_user', 0x3d, 'vmnet1'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 212.593203] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 03:25:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, [], 0x23}, 0x1000}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}], 0xffffffffffffffa4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) getdents64(r2, &(0x7f00000000c0)=""/185, 0xb9) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) [ 212.681749] ldm_validate_privheads(): Disk read failed. [ 212.690932] loop5: p1[EZD] [ 212.707803] loop5: partition table partially beyond EOD, truncated 03:25:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0xc00) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0xffffff98) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2003, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 212.731269] ldm_validate_privheads(): Disk read failed. [ 212.740971] loop4: p1[EZD] [ 212.748372] loop5: p1 start 1 is beyond EOD, truncated [ 212.754576] loop4: partition table partially beyond EOD, truncated [ 212.803484] loop4: p1 start 1 is beyond EOD, truncated 03:25:44 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:44 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000280)={'lapb0\x00', 0x3}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) [ 212.856099] ldm_validate_privheads(): Disk read failed. [ 212.863192] loop1: p1[EZD] 03:25:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x880, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x2, "ddca"}, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 212.914175] loop1: partition table partially beyond EOD, truncated [ 212.947365] loop1: p1 start 1 is beyond EOD, truncated 03:25:45 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000340)={0x2003ff, 0x5000020000000}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r3 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='trustedtrustedppp0^[md5sumnodev-vboxnet1selflowlan1\x8e\x00', 0xfffffffffffffff8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0x42, 0x7f}]}, 0xc, 0x3) r5 = getegid() fchown(r1, r4, r5) keyctl$unlink(0x9, r2, r3) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffffffffffff, @loopback, 0xfffffffffffff7fe}, 0x1c) 03:25:45 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) clock_adjtime(0x5, &(0x7f00000000c0)={0x45301700, 0xfffffffffffffff9, 0x8, 0x100, 0x80000000, 0xffff, 0xe2, 0x8, 0x3, 0x7fff, 0x2, 0xa42c, 0x8, 0x8001, 0x8, 0x3c9, 0x0, 0x20, 0x3, 0xeb, 0x1, 0x0, 0x4, 0x0, 0x80000001, 0xffffffffffffffe0}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 213.151623] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @broadcast}}, 0x33b) [ 213.192008] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 213.213645] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 213.234496] loop5: p1[EZD] 03:25:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 213.251338] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 213.297319] loop4: p1[EZD] 03:25:45 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x69, 0x103) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfa86, 0x123401) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x0, r2, 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 213.319118] loop4: p1 size 2047 extends beyond EOD, truncated [ 213.333296] ldm_validate_privheads(): Disk read failed. [ 213.339416] loop1: p1[EZD] [ 213.351865] loop1: partition table partially beyond EOD, truncated 03:25:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 213.398426] loop1: p1 start 1 is beyond EOD, truncated [ 213.411624] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 213.425592] print_req_error: 3293 callbacks suppressed [ 213.425598] print_req_error: I/O error, dev loop4, sector 1 [ 213.446663] print_req_error: I/O error, dev loop4, sector 1 [ 213.452547] buffer_io_error: 3288 callbacks suppressed [ 213.452553] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 213.465674] print_req_error: I/O error, dev loop4, sector 5 [ 213.471994] Buffer I/O error on dev loop4p1, logical block 1, async page read 03:25:45 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000700)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 213.502480] print_req_error: I/O error, dev loop4, sector 1 03:25:45 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 213.502494] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 213.502560] print_req_error: I/O error, dev loop4, sector 5 [ 213.502567] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 213.502634] print_req_error: I/O error, dev loop4, sector 1 [ 213.502641] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 213.502915] print_req_error: I/O error, dev loop4, sector 5 [ 213.502922] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 213.502993] print_req_error: I/O error, dev loop4, sector 1 [ 213.503000] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 213.504107] print_req_error: I/O error, dev loop4, sector 5 [ 213.504117] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 213.505225] print_req_error: I/O error, dev loop4, sector 1 [ 213.505233] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 213.505295] Buffer I/O error on dev loop4p1, logical block 1, async page read 03:25:45 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x5}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) dup3(r1, r3, 0x0) tkill(r2, 0x1002000000016) [ 213.673401] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 213.673411] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 213.673441] loop5: p1[EZD] [ 213.844122] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0xfffffffffffffff8, 0x0, 0x0, 0x26}]}, 0xffffffffffffffd5) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{}]}) 03:25:45 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x200004e23, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 213.874751] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 213.912247] loop4: p1[EZD] 03:25:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x2000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="20000000c792c29563878b39394606147895c9409133247cd5395cc3f11bd2ae62d80975d894f460bd594634", @ANYRES16=r2, @ANYBLOB="10002bbd7000fbdbdf25150000000c0009000800020001000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000050) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) bind$inet6(r1, 0xfffffffffffffffe, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 213.928670] loop4: p1 size 2047 extends beyond EOD, truncated 03:25:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[{0x6, 0x8, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x15) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:46 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1000, 0x500) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000000c0)={{0xba, 0x8}, 'port0\x00', 0xc0, 0x20, 0x101, 0x58, 0x8, 0x259, 0x7, 0x0, 0x3, 0x7fffffff}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 214.022770] ldm_validate_privheads(): Disk read failed. [ 214.028276] loop1: p1[EZD] [ 214.088740] loop1: partition table partially beyond EOD, truncated [ 214.111782] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 214.121896] loop1: p1 start 1 is beyond EOD, truncated 03:25:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket(0x1, 0x56dccf946c95af4d, 0x7) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xa8, "4dba7496185c37df9dc1729b4114a927c4da78250a1fc1ef9da89d0b68dad9354c7da3b960fcb132d3c9ac6833688b3bdbc5a4bbfc56387f4f9748e61617133332b656363fc1dd241a232ca391a077032c137e4d8217bee5a860da00f9c0ea1df52369307eeaa7272df4a570bfc3b29c976196b913f932f6fff1c1de6cb5466e9237c77d0fe2f093d35581a6225fc8ca6fbe80adddc46f5ec299471ab5fc69657234e12bfeae60d8"}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r2, 0x7, 0x2d}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x7f}, &(0x7f0000000100)=0x8) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 214.146530] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 214.184095] loop5: p1[EZD] 03:25:46 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x5}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) dup3(r1, r3, 0x0) tkill(r2, 0x1002000000016) 03:25:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x9, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_selinux(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x2) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x184) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x80, 0x80) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000000)={0x4, 0x8, &(0x7f00000000c0)="954e11eb25bbdee03a12f95466b4c984acd8acd44de1efa7c7d4e73204ab7c4ff15ab5c57c25e5842a921647c1786c45a61d4568685c1307f16db13399272c4fb17cc90a19303f59469cf965a6216d6f984406951257c531cfc7b622bd41124dc862bedd244a70248ce0e78f83b09662e8789c9847919a6966384e0df60e9f8da3e2f5d4470c929c1ad57ff6fc60920ba60ca50bf1a5ebcdd63a9560de7309825b34e840667885ebb2dc08557b49e238269a6bd43de0b35cb154c049fda4512e8a8ae874bb7570e7a15d484e019a166b28ca16addd1de61fd2e764872c38c1e2c6043aa0", {0x7, 0x3f, 0x47504a4d, 0x1, 0x0, 0x8, 0x0, 0x2}}) 03:25:46 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:46 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000180)=""/87, &(0x7f0000000200)=0x57) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x1, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair(0xa, 0x7, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x4, 0x100000001, 0x4}, 0x10) 03:25:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2000) connect(r0, &(0x7f0000000200)=@caif=@rfm={0x25, 0x4, "21a1be340595a345531bb4296f7b06d5"}, 0x80) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c000000467388b3cdcd3ba0f83ef7ba5bac732f4ecaa56bc075c06de35e18352a6ee0d6ded5e79bd72406b5bde3e26971f9f10228bfd9c31161d89a08b17cb5fe443aaea27a927378c9d307ae2d5aadce342ec88776476752ebc5f24117ff84f90670ba245a80058cef3df0ae9887486683b0083ce515061337b867d543dee1ff88de1b9d92c967be1d81ecd7b9a8e3186f05e19ee5dc183408", @ANYRES16=r2, @ANYBLOB="000226d77000fbdbdf250300000008000600010000000000048d7b0004005f0e0002ff07000003000000080005000300000014000100fe880d64000000000000000000000001000000000000a5bd7295299773dc09c66ca80494d401ffc5d958323935e5cb1ee13deec889ede5e322c4d0847c6c31917dd736feba8ba0"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x41) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 214.400850] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 214.433262] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1a1002, 0x18) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@mcast1, 0x0}, &(0x7f0000000140)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000180)=r2) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000000000, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 214.486881] loop4: p1[EZD] [ 214.519679] loop4: p1 size 2047 extends beyond EOD, truncated [ 214.551377] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x507}, 0x14}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r2, 0x424, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20004000) 03:25:46 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 214.561259] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 214.567430] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 214.583182] loop5: p1[EZD] [ 214.585226] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 214.595674] loop1: p1[EZD] 03:25:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x8001, 0x7fff, 0x5b6, 0x10000, 0x3}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x1}, &(0x7f0000000200)=0x8) prctl$PR_MCE_KILL_GET(0x22) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)="7c1ad33337", 0x5, 0xfffffffffffffffd) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:46 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:46 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2000) connect(r0, &(0x7f0000000200)=@caif=@rfm={0x25, 0x4, "21a1be340595a345531bb4296f7b06d5"}, 0x80) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c000000467388b3cdcd3ba0f83ef7ba5bac732f4ecaa56bc075c06de35e18352a6ee0d6ded5e79bd72406b5bde3e26971f9f10228bfd9c31161d89a08b17cb5fe443aaea27a927378c9d307ae2d5aadce342ec88776476752ebc5f24117ff84f90670ba245a80058cef3df0ae9887486683b0083ce515061337b867d543dee1ff88de1b9d92c967be1d81ecd7b9a8e3186f05e19ee5dc183408", @ANYRES16=r2, @ANYBLOB="000226d77000fbdbdf250300000008000600010000000000048d7b0004005f0e0002ff07000003000000080005000300000014000100fe880d64000000000000000000000001000000000000a5bd7295299773dc09c66ca80494d401ffc5d958323935e5cb1ee13deec889ede5e322c4d0847c6c31917dd736feba8ba0"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x41) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 214.736492] audit: type=1400 audit(1564716346.775:57): avc: denied { write } for pid=9756 comm="syz-executor.3" name="net" dev="proc" ino=35593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 214.826303] audit: type=1400 audit(1564716346.785:58): avc: denied { add_name } for pid=9756 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 214.952322] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 214.966027] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 214.967570] audit: type=1400 audit(1564716346.785:59): avc: denied { create } for pid=9756 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 03:25:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fcntl$setpipe(r0, 0x407, 0x58) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xd, 0x88301) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xfffffffffffffff5, 0x3, {{0x401, 0x8, 0x7, 0x0, 0x4, 0xdf3d, 0x9, 0x8}}}, 0x60) ftruncate(r0, 0x7) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000200)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:47 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 214.981455] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.012580] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.036457] loop4: p1[EZD] [ 215.045605] loop4: p1 size 2047 extends beyond EOD, truncated [ 215.051035] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.061438] loop5: p1[EZD] [ 215.069114] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.078132] loop1: p1[EZD] 03:25:47 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x140, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@empty, @loopback}, &(0x7f0000000100)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r1, 0x1d6a}}, 0x10) r2 = socket$inet(0x10, 0x3, 0xc) r3 = dup3(r2, r2, 0x80000) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f00000001c0)) write$selinux_attr(r0, &(0x7f0000000200)='syst:g\x05L$IC\xcc\xf5ime_t:s0\x00', 0x16) sendmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f00000000c0)="2400000002061f001cfffd946fa2830020200a000900010002e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000140)=0x1000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0x2, 0x4) 03:25:47 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/78, &(0x7f0000000140)=0x4e) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr="b180dfb48d1ce3b8a55d60ab209f455c"}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x5, @empty, 0x81}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @rand_addr=0xff}, @in6={0xa, 0x4e21, 0xc0, @loopback, 0x20}, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x9}], 0x74) 03:25:47 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2000, 0x0) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x335, 0x7, 0xffff, 0x1, 0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 215.270211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 215.321276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 215.380718] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.393999] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.412152] loop4: p1[EZD] 03:25:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000640)=""/4096) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x965, 0x0, 0x0, 0x8}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 03:25:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='ip6gre0\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2a}]}, 0x1aa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 215.425923] loop4: p1 size 2047 extends beyond EOD, truncated 03:25:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) accept(r0, &(0x7f0000000000)=@sco, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 215.511061] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.531124] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.548771] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) preadv(r0, &(0x7f0000000000)=[{0xffffffffffffffff}], 0x1, 0x0) close(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x5, 0x0) r2 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0xe, &(0x7f0000000040)='/dev/snapshot\x00'}, 0x30) ptrace$peekuser(0x3, r3, 0x80000000) ftruncate(r2, 0x87ffd) sendfile(r0, r2, 0x0, 0x800000000024) 03:25:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet(r1, &(0x7f00000015c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001440)=[{&(0x7f00000000c0)="0f54020563066f58a86d12374a2d8ae1ba2353d593a0d3c279c25d6cbcc5245e267e8e205a22c6a1d1465704dffb8ee400d73ef3f81af6eb6048daa56cc168f171244e33b0e8617be9093d440570aa37a7fd6a6e4377d47136dba0595426a9d40f242a33354b016e09d74cb1e8ab5db14cc5cfb892893f4cc7d9ed71a1ae91b798a612ca46deb555c57ba242cffca95d", 0x90}, {&(0x7f0000000180)="4ba733bff66c3de154335e603315279dc785b508ebc3b01c53c712c4e64bfa83980e49a98bbbe00b08dd796db0077a508a466677304ac8874c6abfd2a1e87aa11024d982d4da362317b3aa2b69268eb3ad8753006fdfc3683ef68a087d720881e87ada538ce32ef978e1496024139aae0e0a3c31172d813c028d5a5a8f9d1bcd176255b3e9baf660f63cc6485e14", 0x8e}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000040)="48da0a64b893630bc6e7e68b8a190d7b6480ff5be684bb7746b6e3058b57e67232", 0x21}, {&(0x7f0000001340)="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", 0xfa}], 0x5}}, {{&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000014c0)="3a0c22e992a6e120065bf16f395f13bceeb488ec681be7595564cca10cf63e22eab9b0888b855c244e9dc52a0a52e57463c0aae1c9073c8844e76410f5efd2620332ef8dbb796092eea05b2b877e82df99", 0x51}], 0x1, &(0x7f0000001540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x48}}], 0x2, 0x4000) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000001640)='./file0\x00', 0x400, 0x34) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000001680)={0xa, 0x6, 0x6, 0x200}, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 215.564365] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.585537] loop5: p1[EZD] [ 215.588976] loop1: p1[EZD] 03:25:47 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0], 0x1}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:47 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:47 executing program 2: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'vxcan1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) stat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000600)=0x629, 0x4) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="6dd46033520581a69d09f2cffd74efc76777b850aac6bc61166ab051e5c9db383653cdbd05ef03dfe678030b951e28da8ff7a15c155052e29cb50574d57689b64ddaa3f87d8b8e0fb1d9cdfc8bcd6bea549d56c94fd7d5697ba722ee61504319a9981be47d98d9677039306f27fc63772d2f157fcf6c8af05310dec72e6eecc7b330f4013561d70edb878ccdf89f2fdf58ea70cb5f1d713793e400f558f1cd5f230107a4a935ccb214f994e24d92ca640d9b6ac41551981ab7559bd251d38abb68686169822aaa9c059e907259fe11", 0xcf}, {&(0x7f00000002c0)="0164d0a3ec9881be6ba12f19adb0efc29e93c25626a7feced0ed066cdead8e2ae4257f556753d2109a0c9d11cde8afc920e367866e46b6917d9f253974d106e2153e6fb287b44aa119baf7bc49307e5da1fc5984c0ae36339a15e1c4e93d68a416d6b0e7cea2171732de2c54", 0x6c}, {&(0x7f0000000340)="3148b25e4d899db7dce96d38c895ecb6e5055e734fc285aa14dde7be1009aeb963bf82b7a431a823e2af17f1ee3a7084fb9c2462d8db25607d795513f7bb6978609cc46d1b82866e303470135d5e3484dcdfa757d45688646f1dc433e3e1c4b7222bc43bb6fc89e8e8d6396699af10f252fc20cda83904efd0b033b1f0a7147e131b1983a97f73d99daaec7bcabe30f5fd96", 0x92}, {&(0x7f0000000400)="41a0b92dcdf16f9ce8eabefc75589ba655d8105f82d7520f3f295fbaaf68f2dc0694882538186c13086bd0eae3c44986f99c7a8b7fa01c8a8a9e1669a963b5db1095eb457faf845671df5c7969853b1517bd2b677bde805715c830b381493af08744e1e4b835d6167a163a5e16ff4548d1f9bb367f4c9e5215ce803b46e25ec98439b2b6ca83595f9802c017185764f5f55f8f9ce4da5badd8712671b3694873054713d33395e0cd2671c452b8a21366b8c19e64880f743bd24b601abcb115c0fd1e3b74a50ae69c14ac0f27d45c33e5e40861326ba8919ece36610eec7a9b111f77310bd73889a9b258a80d377ab9a60faa3e1f3fd8", 0xf6}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffc}}, @txtime={{0x18, 0x1, 0x3d, 0x91}}, @mark={{0x14, 0x1, 0x24, 0xffff}}], 0x48}, 0x80) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\x01', @ifru_flags}) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000680)={'irlan0\x00', {0x2, 0x4e22, @loopback}}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x8, 0x4) 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001280)={0x0}, &(0x7f00000012c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440)=0x0, &(0x7f0000001480), &(0x7f00000014c0)) r5 = fcntl$getown(r1, 0x9) r6 = getuid() getgroups(0x3, &(0x7f0000001700)=[0xee00, 0xee00, 0xee00]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000029c0)={0x0}, &(0x7f0000002a00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a40)={0x0, 0x0}, &(0x7f0000002a80)=0xc) lstat(&(0x7f0000002ac0)='./file0\x00', &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000002b80)=0x0) r12 = getuid() lstat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004140)=0x0) fstat(r1, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000004200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000042c0)=[{&(0x7f0000000700)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000780)="b59099d953680586b1c6eacd2192f1bfa26bc1c5acf2492f772b649c1534c0f42a84c7301cdd20df19e2e2b51af35214dbba050f6aeb800ee09cf1f05d92dbb6cc3ddfe3f37b67f79dea6041d03d54dc80de4c6f2fc7900f85456a1c22e138475fd0a1f457fb15c9899f4fe3c51b883fcc92dde33bf523aaac2a5a5da062e619d121af48a15256ea4c34228eb8f6acd3ab3b4dae46071a4413c31d8a00069edbafd12f7a27e516133b833f6b2b99b26db4321253736f13407fa61098c6c9dcd9f377e380c5", 0xc5}, {&(0x7f0000000880)="fb2b2ab8ba11fafdc249270bf858aa1c8c6f6eb1a366890d18acb9d587fce42b7dcb6e419064694fde64c50819e261131a50d6553981a68e6b0cf75e084a48bcb49f88704e5e00f9d624b35f8adcf786", 0x50}, {&(0x7f0000000900)="8bb0acfc4ef68c3f57407cfc03576f1988c1d53273d63f5fe45a8f4de6c4cc64a8e9c0f655c38c7c81a7f2b654b7c414728289458f2f124c20cfd2083f32f733bc707f223cb947833f1767862696999305d05665518baa80a560a728a7b4d2c963f16d58cf91a733dbb5eb636ca7ea43c8088d7f77a041d3361fef31615698a388f2c64f74cf55282aefdb0bae2d503271a664aec91f437c0af1aa1159264b36808c8e9527a7fba6da9498620fdf0d62ab68a20e8428fd362b09244d", 0xbc}, {&(0x7f00000009c0)="96119a376477f7b9e49e4dca9ee78758541c26d5971b8ae7651f87a60ed4fcaef894abfa940a5ff5ede236eb0bdbe7ea8b0f90f63c50b790030de6cc0e8f9b418ce1813939de1fe026bc190677722cf7ce1185c68f16e7329e1e9f014678a7eea946a5c8ca7f6df56a68b8d3e5b6e07e5972c5c8f3bf2bd1bca701", 0x7b}, {&(0x7f0000000a40)="40ae94f48f674efa20c8eb9f88d459b9051cc5554e623ec4a77b0d2f326097fd51fb36a839914a8fd653da9c83808741899687e4574482338996b69ec735fa440899daa15ae4434bb47f24c7b187e6cf4bb6da74c546a3cf521cc558f280ea90f3976d5452dfab0e99c138d40507739af8752ffc9c15ce62b985dee2d0b7420e39396a020e4ebbe0a6d846d77e600f9a5de1094f07470b10b244672aa6680eb1aba5e35522c4b047ecb9618d059eba4a573c19242d5e67493d714860524a2c8b82f78251d96cd02fc79b10c8a6ed1d0abac6f947f37b36fb2846eb1f15c42203e19aa872780fd4a8c3a007251a832cc343162f3aab0f18a8e4", 0xf9}, {&(0x7f0000000b40)="4a1ae60007b7d492f36c565fcc2230c4f14a503299c91fe2538f60251fd328757b805be2a3c2a875014bb03551e7d34eac2f63ee6c6b84f87d6c0520ce3637352cd1674b0eed3e71a44d9a46bf05185d917d8ab1081d0b5d2b9f74735d01a0f49ab9c718c67f734af3e7825d17d55bdcc078a6812a869d3daab83037b81966987b2dae", 0x83}, {&(0x7f0000000c00)="d92169f4e45f09ed6193ce3423eaf97d01738f8dc65b217a0e65c6b0c165320169fb1656bbda66db6f5705b1163c02dd168ab9d08ed08a69c4523716f7e0968dbca6b3c3850f45e44cddf8b45a0b99e4a3ebf3e7f1f92dfdc71aedf315dc8550d7947e57f32db40ce539e9b3abaa5c35b6cf48102a5e8f29c08fcc295729713cabda343f1a789ed114356e56f6ceea92c664892fbc0eefd02f169100d9eb7425aaa01b8d6e7f054590427cf3f287da72d32d3c91619767ef06724ff2a70bdc16b1", 0xc1}, {&(0x7f0000000d00)="eb7216399ef008118748ca67600439980cc5177cad19f00f76cb5f9c129bc4799a943b49a029c9f373cd358bd4c1ad32ac2ad825058e3c5775f87c612fd7cff547078a92b6ea19", 0x47}], 0x8, 0x0, 0x0, 0x10}, {&(0x7f0000000e00)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000e80)="782c83d41f5b58d3d97bdb4542bfedad7f0c1c0c752f42b9260ef62b3462d7f04209d36f32696965de2891c23dca5aabb1ef56c58a59bb81263f9523c71c943bc3934404e6b13aafc898d173d4457afd8d73be8f9fdedc8968a6721c378ba1f765574f408bd994f9571618f1b6c62d8674af658b61d8399c8957e9e731667f9be178c66ce4a0d1595f83a90099d603af0b94b16e6d9d1c518897c6f064a5069ff7d32282e54c3d103925386f1521f67cb6eb210c505d38d9f0cfa514bce80aef118fff9efa537090", 0xc8}, {&(0x7f0000000f80)="47419e64404210947f7f652b249eba6864be1ba924d6168fde01d60d5d67fd12ab73b1bda046e1630059ad43d415163dc1c8e2bc814e7e25fc654a7d0032e7740d1e1da5547981498f314afbcd46367c7b3add79b5c6468b8f576917c5163ee35207f4db7e716d9071addd219a9d9742f85bb9f708d31db12fe7f34d9fe02f2df6b79551b825bc114678763f000ae913dfd99bf63b62c075288bb5359764ce82e2733d3db734673566ca44aa22c9e280dd44eddc25670a3d2231149cbfacce3c36c42a1bd9a67b5d6958d888c3528c81701a87ca198b90e48902ebf5107f3da3ab2a4e59b2495309", 0xe8}, {&(0x7f0000000500)="5c676fc94ef8fee14a4ea62827cce6859d53518ea1ba492b3e00bdfb21c60284832d9ee7a9185dd39f3d2cb635", 0x2d}], 0x3, &(0x7f0000004540)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00678eb61177a6d8dd9bbf921a0daa613e01d7ee55c61311b5319821434f3a54e5df216acd213976f5aef8bcb95fed2df0d86d6be4c83aba53fe1bcb1b8622a43c3a95fd322b3e70e9b6846b57a1ddd6e3083182e942a30d368e3b4a8e8c1205d60f71437cabc588ee0df3f15b3859b7ed66717bebff0d0f90a5b4a5abd693cab0337978c57c7e3cea96c1d6b7d0c76e8aa2c5470800000000000000638d040e23da5dc07ef85dfcd5c6f18a9dbc4e491c4bc6f290b82b1acd2f69c34f5b5409dc96"], 0x30, 0x4000}, {&(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001140)="44c918e685019fe38ac6496421270f2d1c1fd91d5b2af5c39661827f1ca503d1ec82fcd26051049bc3efef64e9e0444c5076edcec0487cd269a1272af8e275bc673f911257604ddf750dd6f0b91e815ec9e4a99031a2d049187ce52f559fc74876487fcdea57ce6f5ca65bfab6444a2d7fc107d768cf33aa894a5ba4bea79e998d14bed0c77bed95c2fe41f203535865de6deb7f431b9387505b23ff55b69584588c49208468de755db6f159da37cb46bf09999494b2e626b37e88ba04be2c68befd0bb389a5202126ab3b75d221c9c6207983680666d4dde2b048e743ee6082aad1de25a3dd3ded7b306a95649eacda066fcd", 0xf3}], 0x1, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x20, 0x4010}, {&(0x7f0000001540)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)="dad3365e6203c1019bd89a9ee49232daee", 0x11}, {&(0x7f0000001600)}, {&(0x7f0000001640)="dee9f2db9ff60be6658e77a2de4e115c81e40ed6c4d6d84a2e38c27b9d9d904ff9616932187c0fbcd30e25546e93869a8aad02aa1fc89fec52798445f1ce47208c5300779fa66dabc6eeb7bbc88c76f22c37aa99a4108b9b7f31f7ba5a9492396e03d9f1add1e7180172ac3a9d76da2c38d4cd1874837a263fff5ed95c08f0", 0x7f}], 0x3, &(0x7f0000001740)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x2c, 0x1, 0x1, [r1, r0, r1, r1, r1, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r1, r1]}}], 0x78, 0x4000000}, {&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002980)=[{&(0x7f0000001840)="f4", 0x1}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="249c49bc88f0ac01b3c02ed1a1f95b0c0cec159665dca527b78a68bf9c2406b39be263ce549db85d11460d779c4d2e77518bf5ada032cc5f73edb0ca3153f2f0376fbfb8f015c757fb817cd776966afe66641521d5621e12cc3d581571f35a1f5f9e3b3e25f5c470413cc3c6db6f84be856895a425253145704fd02edffb3f", 0x7f}, {&(0x7f0000002900)="43aecf451cc0f49e778836ac60978862cbbfdc55fa72e1fff9efbd4a1b5f716556c6d0276bb61620d99b9376b7e74e2a3ed36e2f2ececb6be727b9f265a7ca68feb7755b4cb096ed7c2046b583ccf41f7f599a71d987ea3f36e28e98b578e3b4bb3f93981a40ea5d73e546ee217a8d64", 0x70}], 0x4, &(0x7f0000002c80)=[@rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0xb0, 0x4004}, {&(0x7f0000002d40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000040c0)=[{&(0x7f0000002dc0)="fae9a68464861da76c1a8109fa88c373b158c47b78828afa96a3d268d907c243e9d2f23be5a1c20d50232631751be265c19697a24b209826a58303f4d7a387935ffb9ed5a0fca38079158912c15e551890dad5813c5b3c5d585aa6d97f6b1c0fe70f922a2d5bbd109eeb6007e3782ef6daa1e9ca605972caf12dbfc3e0ccb84a1b6ced8336f0c21d244620dd6e956b0861e5fd42f21d825e4f5871b446cffd92f0bf1fdb69b857a4d6b50d2b0479c40838ec2f7bc7ea64828115ad6f3a9d1e6ea30f1bd2e4f904d0a1fdc9e752ad9b3c5500604739a901dcbb7e7903e355b010e4f44bb3bab9ceaa7c44c0f9f0cec6d5ca21f249bcd8978dd96ca08e00d830cc5491216daf09da48d9d67025e66eaca85860c64cac1c118566083f87bc956b274105f67dd88ac9987233f000e02b93b7f18a05bf9a588f73d781771822ad8aa11eb1ab5ef946a114fe1c1a6ef33e079db5345dbce76d3afc96eb08e33120fc9056b6d09af17e98ff2334ca2b9805d4b2b30d34c3709eab8d3f7ee7a0f1dce971a5aae6058b55f7e95328d9205b682e830af8c2e7f618efbc0de2903b3ce0fac2cf310d69f8083e5cf9e2ce299c94f93c655eef4eaa34243fcc90a873d3cee2c3c0ae487c2c5dd7e1a3c7cb313c2ebc9dc83d81f55acf383bb32f967f603562567ce9997b88240774c1016d9b7e70b9c1f4e373df5ce65c93ada9d8b1bfc307c7c1ab8169af57da9d46e8bea18feed8f3cf46a0de7cbdfb102ec3ff9efde165aaa28f774cf360058dad278579b0e571a3019a67e98cec11a9a219399bb2a7bebbb1b2217611c4815ce1d2032bada54494d2df5e0179144ed68bc8f67b2d85ff02865cb9c1420514a61617f4036cf593ade91b31491d7c792fa2f69da4335a48bd85a6481a6533abfcb165af5dbbd342aa083d4c3126237b9c6c561cb1c3e3fc8e7fa8cd62e3999969d196f4519991f88b9da5b349c5356696b6a0bc4e95b8a4e14bf8891daa6745c22b2c988ceb01c5bc64a978a8d59e27c90f628babfdf478d80ab5c1b7e51ced5d82d30c0414cb3ec33b7a2c8b980a8256cc33b6b36b7c02aa8114bedc98b38b3349bbd4dc2a84cb40b4f127485314da5bb2f457f83fad5d7b03eb1985d7818e9d0ef7ab514c981dbbab03d7b0f6f43dc10c262a69ce61f655974c4d22a35b968eed6213296a787d89dca3fcde4fa8525ac881600404dd719826f34c0e0b545d27adfbeddce9d92e57624ca865dd548b7baf569fb098d81cd5b3df9809d3e614ec6293f67dcfc61139488a65e372f4a6837d287ed20a4575605cb49b4678c8387ab887c40ff0ca80b1c2dc65b5cf1e962f54da7a267296224e426d3fa4c85d348aca80cb55546a6a58ee80bcfabb55f5844012cc8969d4736a664baf03fdcc877bf1e983e6142c7882d0cc9cb7d0d5d8fa40120f49e40f8e0df548e42494d7667c399b5d524865b8680870626911bcf357c3f22ea7aa0c478beefc6d53a52bf67d237d259426fc4a26b884e0735510bd42cca4770c87aeee9aa5447e5fd4fd68ffc379c2a9da8822ea390b2caa08ffee4437c513d3ec71403f355d0dac36294698438722eff2dcd141dfc6d1c9cc06648bebac9aebbd4f84d0e7d9999cc6e3e138a334cf5096097c1d6f1bc925f6e48fb6069b2fa8258e81c2ec690177a8f450885581542b774fda473fbab5155ac69ec342af02f295f0cd060e7c9ea8bae4c4ad4748dde71b05440b6974b75c21418cd7806825feaf9c27effe379a212d6751a7eaf06f875dab7f7ba7b37cd6267969f4d10d9b46ca10baf72b9d2e8051693eaa913564a9dadc9b2bb3a892a95afb6d1d1cf5eaf30bec460361928e0cd0577f1e845b7e1aa970c9ac3566a542f2cdf405e0ae2923889fd454dc7a3cc58f426e3f15d9a98bd7c5722914d1d0176957533533792d2d25dd32a4fff7e7c45e943338ff0ca23d57b8b1f5305ca660c01085f88c9b80619c5057d42cf84ca94b5aa3738297fee683db0b2fd3be8a8f9004a4ed5fce9d9eb18c5f146abd3d6c808c737d1919c59921a3185e66e8475020fa4f1909b6855809e8e8003a8cc9c169b7ee4cbf308ceccbc3482f53b6e27cfc45607403e6f976c037dbf7eb027d8a43352eef6b76e5f4c5c1d6707a641b0d16d3ebcfcf69c27acdd20cdb2f43f9f59e5ef4227b961d8b114ac17dd49052fe9ee79993840c5bd63ffd2bde99f24d5b068f85389ee74a3e5d754434831d8c4a62c6dbbf3150e5e8ef1cda2ff7e569a30f7948e5ef63953d4f0022a42078310c9a683dae5225238e9b66d36772f8f665eed0d38dd191cc7592dd453b156261f98151ebf62b2eb34d4a9f44a0f29db04b8cb78ea876b22fa75ee77610580c6ba1ba099d7018f9a386957176b074521d5f8df903676721777726d477981f9668466c6fd0aa422cedb10b62e24dbc73947d7a669292a02ca57835da29c7c70c5695c7ce42daf95a1b493c50932f09ec52a85fde7e03a8d2368f803c554b13b528746fd2ec348b9a1f0b834684c2d97cdcc301675b4150249439caa71a4c96e55854bb3d2236d17e89b27bde51d0f972390de26395e0db62f477dc83099452504f6e9d936605a0c3e5fadb8565436c1d3fbab2b36dc6b0a1d842936e9782e374bb901c786d19f38aa95f4d09f74d424ff98276d913cfe3b6cefe6b3791871005a250605cedef82bc84d762d8e0a6cea36f325000706f52aa485dbd134c790697e0a21880bc6e579fd5b746323c528a95d2fbe42849b34ac2857b4c079b8b81456987b6e12f36e1944e9c5459787690075bc6da9fa8d0b6e56a4569bd5713a962d4548eff5e1f2d218e42c88daf55c013b6a1f06b41c572f7419f25478067ee947ce3ac04cbddd24670e81ce050bf085121a900e24f054e503441ae9ba5eaaa21ccfcbe508065f7d57d9e21b2a855d95fa6c20baa89e2675d6a5575c30ea486dbef355343d798c6d5d8b4afb77bf497d0db92a4cb82d27c86b8aabcb1f5e0a7872a558d9d823d2f721ca615a04ac7c6dc6a59ef109ae9b01115bbaa0f86cbde944d976a0f6c98db3f8c0dfb96152a795d60a9dfe6958bd7cdfbe24da70d64c45bedd1f82cbfa2c0379237799843445f703bef1c6066abd1eddc24b868d65ccbbca26d6421d69bd86e5021e11f6f0e8477aa58588a6e00c8ad0ae17a9a958dd9f200dc18c696d3fe6a32b4e5ae5d4ab15aad600b1ca8d5d15cc8ec2a3f9d08622cb570ab8ddc5abf157dd6119cf7f4b90cf309dcb06c32ff49bd97bc9379705671978d19d18d92323c0240a390e8615e3f9f466251e221919d4db2784b7a6f612ff46d904e84823d83a7a7a509f31791d9844e13d1477f6bfd6559f004028fa9bf444a6490000d6d9c923bf14074cf5c834b2cbde9dfd362c4ace64e2fece0ac1f30269612476c6739c39199fbdf803e17a230fbfff048facfb76891042b677bc8cbfd3c46ec364fbdc7d668b3ea7a8103159f8466f27043997a25a6111b26b91b005767897a5a367b4c2a2db0b618acc43e184677f0ba51a66cbc5873a67f1426c70bb4457af0bd4c856cba5b416331482450dc8835e87d46c7f0c8312864e291fcc6e1c88a0075a6140e1e6692289d34289998f440271c4590c9deac27783a2393aaea0be74dc74ee612f0350a0a77b237722dc1a143789c816bfdfba392c432932d46c170104220e0163f28a03a8318d1e4d9d214f67a7e23cdee2671e1ab0ebd3153dfaf19c6dce5813941c40be0cb69452cb4964e5ea1de40d7972b1ff12980097c3e4fd6a8df62ce99f685c54052e13cd020f4afc9d28f3954a7a0665c2d4cf573d298b71dd383661f0df9c237565b6fc9bf1868bd076883885d939201ac59a33d07a421e35f3f8fc5f0d8e1022374f06802732b6b4b36f639b47c94adfa5ca928b20fccfadeb367526e9e20dd74cfa7f149d151beb82fd314c7bf05bf1f191d7d9c2af5200f7e41880b7687d41d81192648745ced51cacc77f5c35de43fa18cba6e9018956d6772e94dbbabefe47bec34580caffbd12f60ad86c3e3fc788e4f38c395a0aeab5166195b4555ec71939f4aef97416c0a0c0a56dd30036738887c72b62cd40cf8553469e51a2bed9f179ae1bf12af628473a215b2b11b7c78598216b947c98a60e282d1c0f8895e9070e25a5e5fe174f692db191366e6f535c0718b55a332337179344347bf3140e07c5fc7ba5203b4832c746b219ca3827ca0c000c9cc85054f4359c4fc2df0154cd9168d1cda06e58f468dbfb2d1850133490b02af6eda652fddd0f21934baab502a57a819fb0a9cb147456c7ed519e9a8720ceddd80210f868e9786fe414109d4be9e836f0c6e8f9b352452a4312fa2d574e8a2a1a2aad83a7cf87d2d0e6f222357e804ab29e1be012ac0e590cdcfd1b7f03031af49c9fc813ee9bbeeeaf42b20c96bd86eab12e7759b199841bf27e6e9387568d4ef0ce881192b70e806cd378fd12071b2dd491a9dc233e1905d554e814902a5c80dd9fd499664d71fbd29cdb3ea8643b8fdbf650cccdf7d7552bcbcf2bdb6a4ca6ea201540dd203ba4ee9ffc61a9a44a04c1db0563e675ab4296b40fd11cf3f77d318df9a0466b6302c7c6eebc1cd7597182a27e3901af1f01c1e1996565555dcf383e5485edf84447711d7e2701a2bf75f38adf4693177927f90e8f7469e2a40d018dd2018665265410d6f44183ccb05463d28770917f51a9043ee6278fca62791efcece2bfb142b86345317c6ddeb16cd0ef60f31b6adf9c1bc697fcc809b147823c072697d2e84b1aa44a15ee179030108822b5452b17bf4a913453d46070264cc2265b724250fc9944467025fbddd31dc5db34e91203445eb0cd91b8c8f01ca72b78110ac809c3b4d39ca6d7e5bb27808aa2da943ea9b02b9a15b02234ad859ab6bb773e63ac3ca3f2e4f9207a53b0cdbad0e5f63b034bdb52287438c5071755816058aa84d75e0160a5797f38f5126369c533d1a19674ba8f5c86dd787bc60a38b096562dae97a7aae8a78b0b4b5bd6779782378f3ea2b6c469754fc6fce2992aa2729ac7936c4c07165570e587c44859b0a948488ee08c38910051905978b4b8d6bd1ce14220aa690c7790518812d777f155ceaade6b087689d22c88d5af1323dd3df23cfe1b46c0c94d77599961e15d507b7d5fb049d9b52b7ad4cbffa24108e11c2da51f3bcfd7ed2e4c1b61471f36757890ac9563e6c6ab950a50060880a17daaccbbe2fa3680f64c22038b9e38974e141f53d4d6c0d0529fa9f2ea57c7489e9176532d4902ed96bc7da91f5eb402107d00c28faebb12967c4fbdc9547f55dc739cf4bb601f544f4a8b43e2dbb8ff6d8386b38abca2e98545a3dbc9c2a247f33b71539d691185cdf4fb190857cc6b057e9e3d72da6366c6c401d7b2357bfbc874a273241d42a336031999cbcecdae9e98f8461a3a204bd833596852c95231fa0704bb4b56b77af4ade7ab01ec2b22f1d85c2be3041243de71ccfe10b0413bfddf4e12f25f7886ad9b74ec0ec939e26a60556b54f729d64523201b669affc35ee6e093a3c110de06bf3785105374d889728b7f5e237aa60f6cf8be8470440c192539e354f8b928330963cbbcd6e7e19489059c580eb0de7dbe55d34b1dda3fbdd5e6f79eef8b0ae640b74a22fadff9fdd3bc9e0267ea47417b1ceddf5c20ea5d82bf51bf18e30182cc682d80e72a5a8ab585a0391a10ecf608038b6099f72100685b90874f804f905d3b5f034a5d5512977a2b03c8f33745e02998ae931e77d233d24a6a26cd5", 0x1000}, {&(0x7f0000003dc0)="e65888ff05cd1beafa5bf0f6f6b276ed820a111502df7391dcf941baac5c5576c4e8ac6331775dba89b2ff5e603f1d22663610c24dbc957f60ac38aaf0aeb598d1849f737e8ce355e7cc5a913e20bfd5261ce97f3dc550537f8d790fe402bb608b7dfaef4a06ca72f7f843009b1ee584f910dd51", 0x74}, {&(0x7f0000003e40)="663dda0089c871dafbe70c16be83551e7d0085e6d7f32fa5f92396ad00ac52f86b603b7aecf7a2bf517ef452c6b3abb3b25a7417894a685cb0ca6ec7403b1062b88dbc9d24fc7659d867e34fe82a662fe2f44c5a5df8e969d1", 0x59}, {&(0x7f0000003ec0)="19897f55771789a7fab0729180b9f29993135452fcc2077581fe2ef3a4015a6da92ebf688fa977406a699e3b39938f762a52ee4e2f651e9153953c4bfa517ca07e5ccc07ea35b15ce63beb5b2b2bafc5a10bdb18dfca87c4705200b693336112", 0x60}, {&(0x7f0000003f40)="2e72f4604418ba408fcfb3ebb3d672a5a579578d526f175defd314f4dc5f2f05d60a8828a085c59f525872e209c4682654d4b4232f7ecd673852e6b8131e0feb771526ac64bbb0e6fc5f3417d39081e23e1b256d1c25c6af8ea9ddf3102a7e6149ffac257d", 0x65}, {&(0x7f0000003fc0)="e6f4b9102a4b2752584f21afad175149d5c007e8a34efba11abded9785256ab65bd402d0a615c8d3391aad6ff44784f246e4c1afe78fa9bdb9ce1844d7ece02980a58d9551df32d210ae3c9774b5e28c58efb56acf3d8ff1b3c276b1ff2630623a684731076c490cfb316fcff5e4df804f0a16895184cf2a1a444b56adc16cc103cdd260ee4527072561eec7536bb59b6c94e2354f38b21260d2e83e80c96957d46c836706e8210cdcd12230ef778c194228599d1c9b5395e2ca1ff9f928f616d2d62c9cf3e12c4aefd16579", 0xcc}], 0x6, &(0x7f0000004440)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="000000697c5be15914f01967f88f664b5bfb0d19a7f952f64897522e095247db3abe1aec480740ae6f6cb96fa34d0c3d5ee311d3"], 0x40, 0x44000}], 0x6, 0x0) bind$unix(r1, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ff9000/0x4000)=nil) fstat(r0, &(0x7f0000000000)) r17 = getegid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) getgroups(0x6, &(0x7f0000000240)=[0x0, 0xee01, 0x0, 0xee00, 0xee00, 0xee01]) getresgid(&(0x7f0000001080), &(0x7f0000000340)=0x0, &(0x7f0000001600)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fstat(r0, &(0x7f0000000480)) r20 = getegid() getgid() getgroups(0x5, &(0x7f00000006c0)=[r18, r20, r17, r19, r18]) [ 215.892922] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.912168] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 215.929363] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.935727] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 215.969529] loop4: p1[EZD] [ 215.979749] loop1: p1[EZD] [ 215.983592] loop4: p1 size 2047 extends beyond EOD, truncated 03:25:48 executing program 2: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'vxcan1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) stat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000600)=0x629, 0x4) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="6dd46033520581a69d09f2cffd74efc76777b850aac6bc61166ab051e5c9db383653cdbd05ef03dfe678030b951e28da8ff7a15c155052e29cb50574d57689b64ddaa3f87d8b8e0fb1d9cdfc8bcd6bea549d56c94fd7d5697ba722ee61504319a9981be47d98d9677039306f27fc63772d2f157fcf6c8af05310dec72e6eecc7b330f4013561d70edb878ccdf89f2fdf58ea70cb5f1d713793e400f558f1cd5f230107a4a935ccb214f994e24d92ca640d9b6ac41551981ab7559bd251d38abb68686169822aaa9c059e907259fe11", 0xcf}, {&(0x7f00000002c0)="0164d0a3ec9881be6ba12f19adb0efc29e93c25626a7feced0ed066cdead8e2ae4257f556753d2109a0c9d11cde8afc920e367866e46b6917d9f253974d106e2153e6fb287b44aa119baf7bc49307e5da1fc5984c0ae36339a15e1c4e93d68a416d6b0e7cea2171732de2c54", 0x6c}, {&(0x7f0000000340)="3148b25e4d899db7dce96d38c895ecb6e5055e734fc285aa14dde7be1009aeb963bf82b7a431a823e2af17f1ee3a7084fb9c2462d8db25607d795513f7bb6978609cc46d1b82866e303470135d5e3484dcdfa757d45688646f1dc433e3e1c4b7222bc43bb6fc89e8e8d6396699af10f252fc20cda83904efd0b033b1f0a7147e131b1983a97f73d99daaec7bcabe30f5fd96", 0x92}, {&(0x7f0000000400)="41a0b92dcdf16f9ce8eabefc75589ba655d8105f82d7520f3f295fbaaf68f2dc0694882538186c13086bd0eae3c44986f99c7a8b7fa01c8a8a9e1669a963b5db1095eb457faf845671df5c7969853b1517bd2b677bde805715c830b381493af08744e1e4b835d6167a163a5e16ff4548d1f9bb367f4c9e5215ce803b46e25ec98439b2b6ca83595f9802c017185764f5f55f8f9ce4da5badd8712671b3694873054713d33395e0cd2671c452b8a21366b8c19e64880f743bd24b601abcb115c0fd1e3b74a50ae69c14ac0f27d45c33e5e40861326ba8919ece36610eec7a9b111f77310bd73889a9b258a80d377ab9a60faa3e1f3fd8", 0xf6}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffc}}, @txtime={{0x18, 0x1, 0x3d, 0x91}}, @mark={{0x14, 0x1, 0x24, 0xffff}}], 0x48}, 0x80) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\x01', @ifru_flags}) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000680)={'irlan0\x00', {0x2, 0x4e22, @loopback}}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x8, 0x4) 03:25:48 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x940, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 216.066137] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 216.104716] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:48 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 216.149002] loop5: p1[EZD] 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x401, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x54, "40c785d4d984f0e132c54306ce5d5a41a2bc0c553e4779da65d2695f08559799a4e6109e9573b951670fe38441124257d49523ecd62e15f6ee2849edd361d815488fa4c1395cd187b1fc3b796436840b869501ca"}, &(0x7f00000002c0)=0x5c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={r2, 0x1}, &(0x7f00000004c0)=0x8) [ 216.301597] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 216.351797] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 216.366407] loop4: p1[EZD] [ 216.375189] loop4: p1 size 2047 extends beyond EOD, truncated [ 216.400543] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 216.409985] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 216.416406] loop1: p1[EZD] 03:25:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x142, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x1}) fcntl$lock(r0, 0x27, &(0x7f0000000100)={0x2, 0x3, 0x751, 0x9, r2}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:48 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0xffffffff80000001], 0x100000}) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x10f002, 0x100a0}) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1000, 0x181400) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000480)=""/167) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@mcast1, r1}, 0x14) 03:25:48 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:48 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) process_vm_writev(r1, &(0x7f0000002440)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/234, 0xea}, {&(0x7f0000002340)=""/245, 0xf5}, {&(0x7f00000001c0)=""/83, 0x53}], 0x5, &(0x7f0000000040)=[{&(0x7f00000024c0)=""/248, 0xf8}, {&(0x7f00000025c0)=""/192, 0xc0}], 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 216.592010] *** Guest State *** 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fffffff, 0x101000) openat(r2, &(0x7f0000000040)='./file0\x00', 0x27daa0f2cb998a4d, 0x4) [ 216.615557] CR0: actual=0xffffffff9ffffffa, shadow=0xfffffffffffffffa, gh_mask=fffffffffffffff7 03:25:48 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 216.667014] CR4: actual=0x00000000000120e0, shadow=0x00000000000100a0, gh_mask=ffffffffffffe871 [ 216.676432] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x402040, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000180)=[0x9, 0x1]) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) futex(&(0x7f00000000c0)=0x2, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)=0x1, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0xffffff28) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 03:25:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x90041, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x7}}, 0x18) 03:25:48 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 216.710665] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 216.726145] CR3 = 0x000000000010f002 [ 216.739219] loop1: p1[EZD] [ 216.784249] PDPTR0 = 0x000000000e965001 PDPTR1 = 0x000000000e966001 [ 216.794535] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 216.812508] PDPTR2 = 0x000000000e967001 PDPTR3 = 0x0000000001a3d001 [ 216.823933] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:48 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 216.853800] loop5: p1[EZD] [ 216.858178] RSP = 0x000000000000ffb6 RIP = 0x0000000000000003 03:25:49 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 216.900906] RFLAGS=0x00010013 DR7 = 0x0000000000000400 [ 216.937528] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 216.948923] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 216.981857] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 216.990600] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 216.998664] ES: sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000 [ 217.009897] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 217.018547] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 217.020207] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 217.030281] GDTR: limit=0x00000000, base=0x0000000000000000 [ 217.044223] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 217.057064] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 217.070568] loop1: p1[EZD] [ 217.085185] IDTR: limit=0x00000000, base=0x0000000000000000 [ 217.094040] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 217.102207] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 217.108610] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 217.116216] Interruptibility = 00000000 ActivityState = 00000000 [ 217.123168] *** Host State *** [ 217.126379] RIP = 0xffffffff81173b5f RSP = 0xffff8880654e7998 [ 217.133631] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 217.145645] FSBase=00007fd4d670d700 GSBase=ffff8880aef00000 TRBase=fffffe0000034000 [ 217.153523] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 217.153534] CR0=0000000080050033 CR3=000000009fe18000 CR4=00000000001426e0 [ 217.153546] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018f0 [ 217.153555] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 217.173424] *** Control State *** [ 217.182930] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2 [ 217.186662] EntryControls=0000d1ff ExitControls=002fefff [ 217.195266] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 217.202235] VMEntry: intr_info=8000030e errcode=00000000 ilen=00000000 [ 217.202241] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 217.202247] reason=80000021 qualification=0000000000000000 [ 217.202252] IDTVectoring: info=00000000 errcode=00000000 [ 217.202256] TSC Offset = 0xffffff896c1e119d [ 217.202263] EPT pointer = 0x00000000a12a301e [ 217.202271] Virtual processor ID = 0x0001 [ 217.240630] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 217.255065] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 217.261823] loop5: p1[EZD] 03:25:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000140)=""/104) 03:25:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) eventfd2(0xfff, 0x800) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:49 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x12000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:25:49 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x58, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x1, @mcast1, 0x6}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x7fff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x1ff}, 0x8) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x8000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x100, 0x10000, 0x80000001, 0x1c1, 0x5}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:49 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x181) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x1c) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x77f}}, 0x18) accept$unix(r1, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=""/165, 0xa5}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:49 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000dc0)={0xe, 0x6, 0x80, 0x7, 0xc4, "f55c05bd806b7be26d1f29f9a445f85a17bdb834e39ff6f24f60e7a8aee8f59f36b392ed943896de50e6cd9b135d546b04bd32830c48798cf5e76d5187b46fe87ef2e33c4b7bf4e8cec67e773e805d26e800b9e0df63b200ae06c29090239cdb5e52d01cd7bfa0fd51b3a3616d3591a7d097709c6b8e440d33f1b46f39faebc32ab97d5be5bd3eca119e5825094858137b6f02dc21f193aee525e21d9db80c1163554a3587921ccff25803a1c47fac6aa61673aa6aeaa1e56976b61bd64df71b7e580bcb"}, 0xd0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e20, 0x5, @rand_addr="103fcbef487fd7b8fa2f04b912e4cc92", 0xffffffff}}, 0x6, 0x2, 0x0, 0x401, 0x9}, &(0x7f0000000900)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000a80)={0x0, 0x64, &(0x7f0000000c40)=[@in6={0xa, 0x4e20, 0x126, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10001}, @in6={0xa, 0x4e21, 0x7, @empty, 0x9}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}]}, &(0x7f0000000a00)=0x10) connect$tipc(r0, &(0x7f0000000a40)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x4}}, 0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000ac0)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000007c0)=[{&(0x7f00000000c0)="e532c016fdb9d8bed5107fbaadda0c5d1314afc5b636eedc246b690281b7552e8386c32c8a9add0fa70bde6465aa9994321e69c720d96e12a7f0a461ffb5a806575fec4813979a3d16a9e29519d4865a21a039e5bfeb0dc890c950adb808c78468e8aee885344078311a2eb0a090e471b3ccf18dd192a1ae4a67d6218a2b876a8a0efc40241f2448b9c3bafe7c14e7de", 0x90}, {&(0x7f0000000180)="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", 0xff}, {&(0x7f00000002c0)="2e00a8a78b7d330242cdcf9375e8e7cbf311a5959aa33750081ffa8cdd12dd87bad1ce4672d39daf969bf5da", 0x2c}, {&(0x7f0000000340)="da1f54e3a89f6b0ce99ae9befe17e5799eb20d91673d4ad57d8f2a05c0214dcbee7be54632abe348d52a10df5e45396316dee035bb504c3097bda8613a26fd0400690d77bd869b132c7c99e614db4356d79ecf304384f17813f703fc1dc56486c16d808cf5fc023ca9a895d94fafbf66de22a8837da1bd4e6898f08dbf901a05a364e9e3ab75cdaa4c4f90b81a276c4ff65c4e1ac8706ee275f449ec42d551e1e63413c47e52f44393cf8cde8931304442357426c0c1370c415fb813ff44cfebadfc19e8d2eb974929cd00a24b8d714734e0531a3b0f5b1ab10c54c922f04e1adbc66b16518a209608889dee70cc5ba8", 0xf0}, {&(0x7f0000000440)="a16fe6475c3f178d87e33ac69811c73202e97422732d94084fc2cb7331827ccd9e4b7fc0f538710573ccfa570999c2fac655223cc6e9656de254bfc734084d7966989011f8b6f86653cf05363fe16556afa78e20fcb57df54b0de426619e3568a725cd538fc137d37a8305e93b16e4a77a8b81758444dea79acaa3e44738113cd3745da8436929783b2d1b50f154dcc8420c705b84038d94cf96cca992b7cbf4b55dce023b6b60945f079dbe313cb441b1e7d050b8ca803f56f3d497", 0xbc}, {&(0x7f0000000500)="e2fc556331f995fe1120c32e37b052cd6418d0ff05bd7edae7acda8dd659cf897ce59c33084328adcb673fcaff8effa7f34cd3ca4a30d3b81d6a04061daa70c9353e51e743e3c5d3fe1f59ffd9a23fd42d14d6fa6f52e6cf900e2a454de4a3528e4035cdf456df9dc12cfae827e573f6c63899657b2544aa340979d43e8337996ba252d3563e09b73501583da792281af20f003cc76101d5f3f230e2e3bdf9b2349d217b2ccf925172cf316dd50180f319104791d93d2aabf5d191687f88ed23760fb8d557f3136fe468bc186fd3c31e576e7e58a57d6d7909d680677f67cf3511849259a0f342acefce", 0xea}, {&(0x7f0000000600)="a9fcc543b23cf8e12fb70547a83a4af395d00be58536d84963afce7d5d1b575b59e70c77d8f9589fdaa22ad861cf839516d2fb50e1ba8d4e6d566f67a73df5927abdb96c285b69dd5493b965e68fac1af5eb4dc2bcbc42acc0241da55f4055e704de848eb391462bd6b351b187518a431bd8b4fbedd60d07b0b19ee28f53fa30fae1bd3a612bcc171d24e0400db96c2f5cc5c6110248f47f2d31997457f9c8ee194aa3b0bd2c72695ec7a6a5a5ceb3e57b6ae4bb62f5489807788e5dd62cf67bf4852bb51d1244ee59639ba0359ba59f58", 0xd1}, {&(0x7f0000000700)="6490088611ae2f1fc2cce872184be7e9cc31f59c415881523928834d78213d84f0ff8f505c76d4cdd9dcb6a660cc26e5b913b255567037f7fcb31cf46fdf646d687f8f88a3678b7fcaae2485097a77867007ab5d8d4257684800009f936a24dfeb36a29b08031a65057d2075e9f29b3e5d51151252fbeb3efe73e6874a46b26fc9f65ea549b527186d834ddd56aa2dfea98c", 0x92}], 0x8, &(0x7f0000000b40)=ANY=[@ANYBLOB="200000000000000084000000020000000300021000f9ffffffffffffffd78d5d4ffcd053b876e2ae628fb23582d570a945bec18ff18f31b77f66997a3bb69ce2ebad2641f84b9f0c923a1e86583c4922f4f34089b2b0a511baef86fd407388a3f831d5d72bf1aee57cc675cf27795349718bae44ce451c50e2713372", @ANYRES32=r2, @ANYBLOB="18000000000000008400000007000000e000000100000000200000000000000084000000020000002700080002000000faffffff", @ANYRES32=r3, @ANYBLOB="180000000000000084000000050000001000000003000000"], 0x70, 0x4000000}], 0x1, 0x4008010) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000940)=0xe8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 217.590701] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 217.601306] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 217.623074] loop5: p1[EZD] [ 217.631673] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chroot(&(0x7f00000001c0)='./file0\x00') mount(&(0x7f00000004c0)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x149000, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) chdir(0x0) 03:25:49 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x1ff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 217.674950] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 217.708389] loop1: p1[EZD] 03:25:49 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x882, 0x0) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040)=0xffff, 0x4) 03:25:49 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:49 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x81, 0x1) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'ip_vti0\x00', 0x7}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/252, 0xfc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x4) setsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000000100)=0x8001, 0x4) 03:25:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$sock(r0, &(0x7f0000000580)={&(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="faa7f7f7730a177c140cdfd9ac9ebcebf583d094f71c2f7710bcef55e6381921e13a70c5e00f2d75bf48aa6ad57a26aeb7247efe7d9f1764d91e91565c79b12373518224d074988e41423ab7ab7dadc5b387007638c49f7adfb09da0b679134c8565e52b68046d1645fa71296cde423f6279d93b4728969fcc4effff15ad56329d4f43f6608eeeb37e7509615d32659bcc517d4cf6b875706366a4a71eef534a5822fdd3df317a41ddc3c4ed7cc10011bc6d52", 0xb3}, {&(0x7f0000000180)="ad37aff57a271366d5d47c70aba3f8f94680640ff3cde3034ac3f3aa057edf5ec20df4a8716a0f61296baffbca87c013cd6a2660153b5103deaf2399a66c4bba14d3be8410bf41bf51954b8b33156badbeec4e65bd91b1180c2dbbb1ba17b8f1e394844c5d3950c1e46ec510b3fc28ae01de5556ae3dba3ff2e61151046bd8c952ab7eef1fe6a33bca529b9ef0b090fc5b2b05ad3f06ec5105d972403c7e72165d0df6d76d653fc65db5b2a1b0e9022c31956dc8efac21b212c801a1e3d7a2668f2d1a07f611d24f55c8ffe010357b930dd451e63ba1e209b8e930b97af9c0c99fdafcc6d1f75b3b88155008a42dd7df59de0fd852f9", 0xf6}, {&(0x7f0000000340)="87450cc10c25972392d2b5bfaa9c956356a382eab93c57ef38799befc3bbdd8a3ece136675ce97369ca05e82efaf2e1a77e0e0c8d9334afadaefe7f666f2ef1dff943e46f37d18fab54fc0b4a520300d8a890d1391f65d65685ab699f43713e3ee617d95779151757f31d7c3d3b8ab040dc245d05f8aec2ec6564fdf118382b4f7138a696d9c269a9f534c22d2f70efbf23c672aa572a79fd7fca17fc9948356efa265135892dab165dd05057b211105ff806938af888a937219d6b11a04fbb252388235a80631a442525d1ed5e43ad4f403", 0xd2}, {&(0x7f0000000440)="e7d0dc4e76c471cc8cf9fd0cec7edf8dd492f8e6f2e23d971b942c2b3bb3dd4a6d5957e01d367e7d7509003c9d507edcf1775a388eac78087270b357ed2a382a1193ae698d44df2b88ded4c5d07dbe32e2d3f6bb87789b04701110288e110ac603bd4ab411a9c0df2214c9e7c95d2dbe92a8ba5d40938f1455453a762191122625f75ad87813ae31662142caf7dbc53787a395145dd5deac5b0ce8605f0d218e71d8d1da8f24a5a6d6026ff7b7c8c3afbd4cf9226fc7b9ee72acee64f3dd1229806a90c0", 0xc4}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x18}, 0x0) 03:25:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x882, 0x0) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040)=0xffff, 0x4) 03:25:50 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 217.972448] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 218.007380] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xd) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xc4db, 0x26}]}, 0x10) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) 03:25:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x181) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x1c) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x77f}}, 0x18) accept$unix(r1, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=""/165, 0xa5}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 218.040994] loop5: p1[EZD] 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 218.070899] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 218.096235] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:50 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 218.126760] loop1: p1[EZD] [ 218.132277] Dev loop4: unable to read RDB block 1 [ 218.148392] loop4: unable to read partition table 03:25:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x50d2, 0x400900) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x5, 0x85b5, 0x20, 0x7, 0x9, 0x6}}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000700)='tls\x00', 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000007c0)={@mcast2, 0x5, 0x1, 0x0, 0xb, 0x3800000000000, 0x6}, 0x20) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000680)='./bus\x00', 0x80000420) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./bus\x00', 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) unshare(0x8000400) futex(&(0x7f00000005c0)=0x2, 0x8f, 0x0, 0x0, 0x0, 0x0) r5 = mq_open(&(0x7f0000000740)='mime_type\x00', 0x6e93ebbbcc0884f2, 0x4, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r5, &(0x7f0000000900), 0x7) [ 218.173598] loop4: partition table beyond EOD, truncated 03:25:50 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f00000000c0)=0x80, 0x34596ddb55b0a80d) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000100)) setsockopt(r1, 0x4, 0xffffffffffffffff, &(0x7f0000000140)="7b5b3e95ab1508564b99abdc2e6f8a2fbefe9332e82ae9206d9f6c77315061cb664eb88b9cbd44d3bfb3dd4d3a8009220cc8017d5899bb8538", 0x39) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 218.220617] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:50 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x22040, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x5, 0x7fffffff, &(0x7f0000000080)=0x7f}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x10000020004e21, 0xffffffffffffffff, @mcast1, 0xeb6}, 0xe7) 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x0, 0x4, 0x9}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$unix(0x1, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 218.430881] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 218.450660] QAT: Invalid ioctl [ 218.455000] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 218.470797] QAT: Invalid ioctl [ 218.474361] loop5: p1[EZD] [ 218.496819] loop5: p1 size 2047 extends beyond EOD, truncated [ 218.525546] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 218.535391] Dev loop4: unable to read RDB block 1 03:25:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x200002) setsockopt$inet_dccp_int(r1, 0x21, 0x7, &(0x7f0000000040)=0x101, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0xfffffffffffffdf8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c) [ 218.543077] loop4: unable to read partition table 03:25:50 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, 0x0) read$rfkill(r0, 0x0, 0x0) connect$rds(0xffffffffffffffff, &(0x7f0000000000), 0x10) mmap$binder(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x100) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) [ 218.574171] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 218.581860] loop4: partition table beyond EOD, truncated 03:25:50 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 218.625494] loop1: p1[EZD] [ 218.631852] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:50 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x4000) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @rand_addr=0x4}], 0x10) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:50 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000380)={{0x1000, 0x2001, 0x8, 0x7, 0x3, 0x1, 0xfffffffffffffff9, 0x9, 0x5a38e6c0, 0x9, 0x9, 0x7}, {0x4000, 0xf000, 0xa, 0x2, 0x80000001, 0xff, 0x487d, 0x8, 0x5, 0xffff, 0x7adb, 0x15fcbdce}, {0x2, 0xf000, 0xd, 0x2, 0xd2, 0x200, 0x2, 0xfc, 0x401, 0x0, 0x2, 0x80}, {0x10004, 0x3000, 0xc, 0x3, 0x100000001, 0xfffffffffffffffe, 0x6, 0x1000, 0x80000001, 0xca64, 0x5, 0x9}, {0x106000, 0x4000, 0x9, 0x8, 0x9, 0xffffffff, 0xf2, 0x81, 0x200, 0x80, 0x401, 0x3}, {0x4000, 0x0, 0xb, 0x72, 0x6, 0x7, 0x7ff, 0x6, 0x9, 0x3, 0x6, 0x4}, {0x0, 0x5000, 0x0, 0x8001, 0x3, 0x5e, 0x9, 0x4, 0x3, 0x8, 0x4, 0x2}, {0x10000, 0x3000, 0xe, 0x5, 0xfc99, 0x4, 0x80000001, 0x0, 0x100, 0x8, 0x8, 0xd97}, {0x106004, 0x105000}, {0x10002, 0x2000}, 0x80040000, 0x0, 0x3000, 0x40050, 0xc, 0x0, 0x4, [0xffffffffffffff67, 0x38, 0x400, 0x3f]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x115000, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000740)={0x0, 0x0, @ioapic}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x198, r3, 0x611, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c7e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f00000000c0)="b40ea7a4e260462c9f74cad3c4f0d514f50197d46dd47a1e104d0dd07bd0f8d88d6e4f63983b010682990bdccf3374679e88938390e17d02cc5a1c84f0a66445bbd291e610c85d4d6fac50e62d1178fcbd5f3f985e45edffbf34c04a3c959c0399ae093bef20ee08a426badbf43d7f2469a5a1b9f625f73613f540b2ad645e251f", &(0x7f0000000180)=""/212}, 0x18) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000840), 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @mcast1, 0x400000000004}, 0x1c) [ 218.693871] audit: type=1400 audit(1564716350.745:60): avc: denied { map } for pid=10223 comm="syz-executor.2" path="/dev/audio" dev="devtmpfs" ino=15441 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 03:25:50 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xae7, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0x1, 0x8001, 0x6}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x400}, 0x8) 03:25:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @loopback}, 0x1c) [ 218.901440] Dev loop4: unable to read RDB block 1 [ 218.908083] loop4: unable to read partition table [ 218.913734] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 218.934098] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x80000000, 0xffffffff, 0x60f3, 0x81, 0x8, 0x2}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() getgroups(0x3, &(0x7f0000000440)=[0xee01, 0xee00, 0x0]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) setgroups(0x7, &(0x7f0000000500)=[r2, r3, r4, r5, r6, r7, r8]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpeername$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x3f, 0x0, 0xffffffff, 0x1ff, 0x6, 0x1d, 0x91d, 0x4, 0x8001, 0x24, 0x80000000}, 0xb) [ 218.956596] loop5: p1[EZD] [ 218.961550] loop4: partition table beyond EOD, truncated [ 218.971682] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 218.979137] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:51 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 219.005353] loop5: p1 size 2047 extends beyond EOD, truncated [ 219.021944] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:51 executing program 0: r0 = shmget(0x3, 0x3000, 0x200, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @loopback}], 0x103ba) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x6}, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0xce7) r3 = geteuid() setfsuid(r3) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e27, 0x0, @loopback}, 0x1c) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2001, 0x0) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.sockprotoname\x00', &(0x7f0000000380)=""/111, 0x6f) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000440)) [ 219.069880] loop1: p1[EZD] [ 219.235093] Dev loop4: unable to read RDB block 1 [ 219.244565] loop4: unable to read partition table [ 219.254580] loop4: partition table beyond EOD, truncated [ 219.270174] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00p\x80\x00', 0x4}, 0xfffffffffffffe0d) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x19, "8f2add9c5612fa823387a5bcea8151e1a1179b0201cb3a7f5f"}, &(0x7f0000000140)=0x21) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4) ioctl(r0, 0x8936, &(0x7f0000000000)) 03:25:51 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:51 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e20, 0x0, @local, 0x81}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x9}, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x1}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x7fffffff, @loopback, 0x9}], 0xffffffffffffff6b) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$inet(0x2, 0x5, 0x100000000) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:51 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:51 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x81, 0x917e0de79abfa633) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x9e0000, 0x7, 0x8, [], &(0x7f00000000c0)={0x990a72, 0x100, [], @p_u16=&(0x7f0000000040)=0x2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x2e, "9d42c83514201856c8790e005ee7dcbe6c6926321659383415fa4e79ee0e83f9f0278c95a44d2cc6b0ab41e9a161"}, &(0x7f0000000180)=0x36) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="5d00000089e2e2a761339106301ed06d9a13286d5ec0276a297e4aa464fd5d8841ef6c19d1ca288a6179b65fe3af509783ced64a10fd230f8aea68a90653ba5a7717cad3f2158fc30534c8d29e65aec0f1a1a6d0a1df9399b71e51c2"], &(0x7f0000000240)=0x65) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r1, 0x6c32}, &(0x7f0000000340)=0x8) 03:25:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x7ffffffffffd) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:51 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) mmap(&(0x7f0000ab3000/0x1000)=nil, 0x1000, 0x1, 0x1001e, r0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000140)=0xc) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200), 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0xc7) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) bind$bt_rfcomm(r0, &(0x7f0000000280)={0x1f, {0x9, 0x3ff, 0x4, 0x5, 0x100000001, 0x6}, 0x6}, 0xa) 03:25:51 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 219.550678] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 219.561531] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 219.586496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 219.597040] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 219.616737] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 219.626678] loop5: p1[EZD] [ 219.644872] loop5: p1 size 2047 extends beyond EOD, truncated 03:25:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2040, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 219.652466] loop1: p1[EZD] 03:25:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:51 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:51 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 219.781380] Dev loop4: unable to read RDB block 1 [ 219.786703] loop4: unable to read partition table 03:25:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x795283, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x41}, &(0x7f0000000140)=0x8) 03:25:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)={0x4, 0x1c, [0x100000000, 0x4, 0x7ff, 0x9, 0x7, 0x5, 0x4]}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xe1f, 0xffffffffffffffff, @rand_addr="0dbb11aff53d190188391b35c44a1290"}, 0x1c) [ 219.828130] loop4: partition table beyond EOD, truncated [ 219.863154] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:52 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:52 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x301000) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@mcast2}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x9, 0x4) [ 220.074979] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 220.101951] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x20000000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1403e60ac66c89a7, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x2}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 220.123924] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 220.137147] loop5: p1[EZD] [ 220.151908] Dev loop4: unable to read RDB block 1 [ 220.162657] loop4: unable to read partition table [ 220.164732] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 220.176883] loop4: partition table beyond EOD, truncated [ 220.184441] loop5: p1 size 2047 extends beyond EOD, truncated [ 220.194609] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 220.204340] loop1: p1[EZD] 03:25:52 executing program 3: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xc4) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 220.345830] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:25:52 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x795283, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x41}, &(0x7f0000000140)=0x8) 03:25:52 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:52 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:52 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x80000000, 0x8, 0x8, 0x15, 0x3}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={r1, 0x1000, 0x3, [0xffffffff, 0xe56, 0x9]}, &(0x7f0000000180)=0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:52 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x81, 0x917e0de79abfa633) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x9e0000, 0x7, 0x8, [], &(0x7f00000000c0)={0x990a72, 0x100, [], @p_u16=&(0x7f0000000040)=0x2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x2e, "9d42c83514201856c8790e005ee7dcbe6c6926321659383415fa4e79ee0e83f9f0278c95a44d2cc6b0ab41e9a161"}, &(0x7f0000000180)=0x36) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="5d00000089e2e2a761339106301ed06d9a13286d5ec0276a297e4aa464fd5d8841ef6c19d1ca288a6179b65fe3af509783ced64a10fd230f8aea68a90653ba5a7717cad3f2158fc30534c8d29e65aec0f1a1a6d0a1df9399b71e51c2"], &(0x7f0000000240)=0x65) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r1, 0x6c32}, &(0x7f0000000340)=0x8) [ 220.610620] Dev loop4: unable to read RDB block 1 [ 220.615681] loop4: unable to read partition table [ 220.656608] loop4: partition table beyond EOD, truncated [ 220.678254] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x80800, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000180)={0x2}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_context(r2, &(0x7f00000001c0)='system_u:object_r:qemu_device_t:s0\x00', 0x23) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x4}, 0xb) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x6, 0x20000) 03:25:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x1ff, 0x1]}, &(0x7f0000000040)=0x8) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3a6) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x1, 0x100132, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x1, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000200)={{0x5, @addr=0x100000000}, "4e4e7db88f468acb13c2781ebe5196ce75429ecab8c94012a00003a66f18506e", 0x2}) [ 220.731049] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 220.732415] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 220.744972] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 220.756221] loop5: p1[EZD] [ 220.759409] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 220.759803] loop5: p1 size 2047 extends beyond EOD, truncated 03:25:52 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 220.797247] loop1: p1[EZD] 03:25:52 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:52 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000001980)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000000)={0x4004, 0x105000}) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:crond_exec_t:s0\x00', 0x22, 0x3) [ 220.829161] audit: type=1400 audit(1564716352.875:61): avc: denied { map } for pid=10464 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=37728 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 220.959498] audit: type=1400 audit(1564716352.995:62): avc: denied { associate } for pid=10483 comm="syz-executor.2" name="audio" dev="devtmpfs" ino=15441 scontext=system_u:object_r:crond_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 03:25:53 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x3, 0x5, 0x8000, 0x6, 0x8, 0x3, 0xb4, 0x100000000}, &(0x7f0000000100)=0x20) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x8a00, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x160f, @dev={0xfe, 0x80, [], 0x18}}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200)=0x29a1df70, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0xffffff88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8012, r1, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, r1, 0xb) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x16c, r3, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x76b}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd165}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x78}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9955}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 221.131902] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 221.152867] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 221.187868] loop5: p1[EZD] 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20002, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x80000) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 2: r0 = socket(0x40000000015, 0x805, 0x8000000000000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="b933000661647e4957571c250cc636d9dcee3f0143fd470a0b60313612a9f9ef8adb3dc5a48f24ce78af1685a461ba045b0a44d1955add83f6eea498dabcdf21b78416b57218864be13b840a05f784199510acd57d98afc8093c0dcd38175e2b6cf877422fb2a47eb5c353d9ab28607f76a42c34d92f0039cf8d5790aecf653a009e4a08b6baa1455ead111485f2dd6fef04f1e091d6a0a8edc6d044b3c30111f2f66d287390917c81aa9a73d519c51ca37b49e1964f061f4f0fc2c10e8bb68b7b8b78835495f87297248fe8237a28e756ba5db3849b5c6a891aedd20ac2e981cfd77425c69a60feff55cbf4ab248e61", @ANYRES16=r1, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x220100, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x8, 0x8, 0x0, 0x4}) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) [ 221.210956] loop5: p1 size 2047 extends beyond EOD, truncated [ 221.250732] Dev loop4: unable to read RDB block 1 [ 221.255908] loop4: unable to read partition table 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x0, 0x5, 0x9, 0x8000, 0x1}, &(0x7f0000000140)=0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2000000, 0x3, 0xfc}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r1, 0x554, &(0x7f0000000140)="9595b6a260d2ad39a1c1b90bfeba83baa78d556dc9ffbd040ffdff910002cf33c7530125c1a323e0741be5c392260c986dfc1aa4a493fa3635454bcf251d03f6c99dfcc1e7e69d2d63e9d6408bc2a53c1f17f16cd2ea7f5d2b0a06b4ac0af78e249e4b2bef16ccd03b831d7bdf5a3c15b8131d75326d381b93ade49d005fe08a773a874833e1844ce45449a1dbc7065465a499291821f840e1d18b41fb68af9e600d2d771fe696a2a7af9a5922bfde41002fe369f154ecaaf83ef7afb8dbf775157200732e2d4eb184ce8b3c3d9d0f68cd8089fd5ae04ef11943e26d6816687a35976ba7") ptrace$cont(0x9, r1, 0x0, 0x0) [ 221.288967] loop4: partition table beyond EOD, truncated [ 221.305255] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 221.308076] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:53 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0xfffffffffdfffff9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x28e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 221.348724] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 221.387246] loop1: p1[EZD] 03:25:53 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x400, 0x100) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000040)) connect$ax25(r1, &(0x7f0000000180)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @bcast, @null, @null]}, 0x48) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000200)=0x8) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$void(r1, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000140)={r2, 0x100000000, 0x4, 0x8001, 0x1, 0x5, 0x2}) 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xd77c, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = dup(r0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000040)={0x2, 0x40}) 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000001, 0x84) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3ff, 0x43) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000040)) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x7}, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = getpgrp(0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)={0x6}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffffffffffc}, 0x1c) splice(r2, &(0x7f0000000100), r2, &(0x7f0000000140), 0x6a0, 0x5) [ 221.611486] Dev loop4: unable to read RDB block 1 [ 221.617012] loop4: unable to read partition table [ 221.641266] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:53 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20002, 0x5) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x100, 0x0) fanotify_mark(r2, 0x40, 0x40000000, r0, &(0x7f0000000100)='./file0\x00') ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) sendmsg$nl_generic(r2, &(0x7f0000001300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000240)={0x106c, 0x33, 0x800, 0x70bd25, 0x25dfdbff, {0x9}, [@generic="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", @typed={0x4, 0x12}, @generic="baee57bfb1e0d352b27eb7840b9fc0daced0e2189e5a5fbf0741d0450d56380fa95d738a43a81871d147ae848e03530d07809530b661e545527910421b499d5f09eccf4b7f1accc6f138e36eb1e7120087d408c4"]}, 0x106c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000001340)=0x8001) getrlimit(0x7, &(0x7f0000001380)) r3 = socket$key(0xf, 0x3, 0x2) mkdirat$cgroup(r2, &(0x7f00000013c0)='syz0\x00', 0x1ff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000001400)={0x8, 0x1, 'client0\x00', 0xffffffff80000000, "679c23f7fe1d4a8f", "09079dfce55110fe711594de6e0db264d8adc04b063373e12f4b6d7ec8dbdb9c", 0x6, 0x80000001}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000014c0)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x3}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001500)={'filter\x00', 0x4}, 0x68) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000001580)=0x60) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r2, &(0x7f0000001600)={{0x10f, 0x40, 0x760a9fd6, 0x140, 0xe8, 0x800, 0x3a, 0x80}, "26503c893b02df6e056be0851e75d4ec5ae47fe0dc45eda9784c2395a34589c910ccd2694f0285f746afb46b730b73d3f035189ef4798f072bd33be776cfe827989fb6ca6dafd1475800c2c1e432b9269f19487ebe9500d1db86f56162d5de1d33255f347fa6789821bbf764e51887a29c5b17bb4cd384115c094a73b366b5151b9e", [[]]}, 0x1a2) statx(r4, &(0x7f00000017c0)='./file0\x00', 0x0, 0x813, &(0x7f0000001800)) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000001900)={0x3f, 0xffffffffffffffff, 0x8000, 0xdc6c, 0x10}) ftruncate(r0, 0x3) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000001940)=0x6) r6 = eventfd(0x4) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000001980)={0x3, 0x18, [0xa87, 0xfffffffffffffffb, 0x80000001, 0xffffffff, 0x401, 0x4]}) ioctl$KVM_GET_EMULATED_CPUID(r4, 0xc008ae09, &(0x7f00000019c0)=""/38) ioctl$VT_GETSTATE(r5, 0x5603, &(0x7f0000001a00)={0x0, 0x4, 0x5}) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000001a40)={0x1, r6}) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000001a80)={'raw\x00'}, &(0x7f0000001b00)=0x54) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000001d00)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000003100)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x20800110}, 0xc, &(0x7f00000030c0)={&(0x7f0000001d40)=@newtaction={0x135c, 0x30, 0x214, 0x70bd2c, 0x25dfdbfb, {}, [{0x1078, 0x1, @m_ipt={0x1074, 0xd, {{0x8, 0x1, 'ipt\x00'}, {0x60, 0x2, [@TCA_IPT_INDEX={0x8, 0x3, 0xe95}, @TCA_IPT_TABLE={0x14, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8, 0x2, 0x5}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0x1004, 0x6, "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"}}}}, {0xa0, 0x1, @m_skbedit={0x9c, 0x13, {{0xc, 0x1, 'skbedit\x00'}, {0x44, 0x2, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x20, 0x1ff, 0x4, 0x400, 0xfffffffffffffffd}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x2, 0x20000000, 0x6, 0x6}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x3}]}, {0x44, 0x6, "e94e4fbb99cc483d7b324df22f379220404b7fd756c175ebef18af3a79663af4ff0e2511bd79b08ca21788aa65cda3b1c7d7a0aa1e8594d03ceb73f088b9c9"}}}}, {0x68, 0x1, @m_connmark={0x64, 0x18, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x401, 0x10000000, 0x99, 0xfffffffffffffff9}, 0x7dd4}}}, {0x2c, 0x6, "98a54fc9e51bed4d6cf5fb2946db5d4b73ee999d22613aab12d43b93ca1e7cea25bba96c90ec"}}}}, {0x100, 0x1, @m_ipt={0xfc, 0xd, {{0x8, 0x1, 'ipt\x00'}, {0x20, 0x2, [@TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}]}, {0xcc, 0x6, "f51fec48f171b7475f6c6fe5e85d167b57f88686af37abcfdbf606d98066a933dd1ecc7bb24147c62f05fdbcaa5e0bcd40fac688e84c15521e0355db84cea0438c8ffb78a96a252c8aa84322e330943170904e63734c94075331f0a083eadf212166e173c1d8f94e5e2bb8d739a94ac612aacd4e97fd2a303ecc8e587b567c46ba3a07821452c070d3a53b2394ea0b490c812c8d8f1c75af798904a8ec8037efe157b2aa0d55797ee5b7ef4f54e67c5397cd7da93d330a796033bb93c0451c68065f68113c42"}}}}, {0xc8, 0x1, @m_mirred={0xc4, 0x6, {{0xc, 0x1, 'mirred\x00'}, {0x24, 0x2, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x1, 0x3, 0xe5ab, 0x1}, 0x3, r7}}}, {0x8c, 0x6, "e988dde0e7b75bca2a4bd65478a7526992ec4602ed9640d82f5687cf65d207e6d478b452f2783aa0a9fa7319c037643c2f32102980ed4370d67b5e12c333f6be58b83d090752e3e70a1e2288e3269bf9321f2ce7b764783b033eee428268459da88c3f75e373a7609af8526511d6139d05fc246cf562012b6c70ee82c928e68c3575e47117779a"}}}}]}, 0x135c}, 0x1, 0x0, 0x0, 0x20040080}, 0x0) 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x480040, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 221.657508] loop4: partition table beyond EOD, truncated [ 221.672179] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 221.688330] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 221.703218] loop5: p1[EZD] [ 221.719886] loop5: p1 size 2047 extends beyond EOD, truncated [ 221.750852] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:53 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket(0x1f, 0x0, 0x7) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bind$isdn_base(r1, &(0x7f0000000100)={0x22, 0x3, 0xffffffff00000000, 0x2, 0x4a2a}, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getaffinity(r3, 0x8, &(0x7f00000000c0)) [ 221.769333] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:53 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="2a2b65bc992fb01b562621eed798cfe1385a785a957f7cd6bc2040fec48102bfb0412f16ec9d59ba6b8d5b3266f87ff85912679ae4bfabe7be98f2e1c32e47f5d991b05a3eba5ef458f11e9d5fc898c3e170b208f875d3d1404e2e687bc2fde9684a45c8fc27e78dc131beb719ff594d5122a791c88d70b3d0de534f0f5014e6d0170245e4176d8dbc79d14b6ed6c806d4373242ff6a1a91ab3af6617eb822e8e44d0fc8de613cc736edc09faa71240baf41b37b13792b622d535680e8d5b06518efe4a5b888d7ca45314eb10aac4ccd612aa3add6ac0d070fe74f661ef00f761e866533f1be6cb93fd655b0e9f6a4722b9e954e3276893ad9d06bda12d60d964943ec8a69953f1287ffc192898a8c446e6137e16b8ed27a2830c8e86a9ff1208807b8d9d3ed12a7f02a5411d30d93d7394b9e57eb8b97f40f21ab245697609dd2d7d32bdca1fc64d551c9d741a332d7720fc0340d7f44f648c07ab43bf19fb5a1f8e715f25aaf80164b90d5ffd99e4f803162bcab8a1989a79bcd593d4c7bb3f116ea7529e03cb61d8e9e88bfa63262e4f86c5388a16bfa3dae97399e62699ee5981498ba573592e180c3fd334aad76b2c05cdb54f53a522cc9dda5d3ddf173d7ff"], 0x7c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000380)='./file0\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r2 = getpid() sched_setattr(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x3}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000340)='./file1\x00', 0xffffffffffffffff) fanotify_init(0x8, 0x7fffc) getegid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getgroups(0x4, &(0x7f0000000280)=[0xee00, 0xee01, 0xee01, 0x0]) setresgid(r3, 0x0, 0x0) r4 = getegid() r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f0000000040)={0x3f, 0x6}) setgroups(0x1, &(0x7f00000001c0)=[r4]) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) dup(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000003c0)=ANY=[@ANYBLOB="d8bd07e52664f3d61e64c66165ceefac7b8e5dfcea92d6d5d2f204b8b38c9165d624cc741bc839d5837c2d6a634b2f53e21589ac84bacf834038e1ab878375774f7aa9863a88400c1ff6f06fecba22af867fbbfa3f504235787f7cc3270239d8496605399a9dfe425cea3c049ebc69dd2555a886c43f65d619969ef0866ff0fa84e0a7ac51cf934caf0679da117cd9d12603e302e859fcbe61ef"], 0x17) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) sendto$ax25(0xffffffffffffffff, &(0x7f0000000100)="398908b5976122ac92ac04e8564ff6372d8cb9759316e0fac85ca5f5d937a202afcdcc22f06fb5ca0ab205aae8712be1ec4ded2e729e", 0x36, 0x40000, 0x0, 0x0) [ 221.820137] loop1: p1[EZD] 03:25:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000040)=[{0x5, 0x8, 0x4, 0xd7}, {0x4, 0x9, 0x8c3, 0x2}, {0x5, 0x8, 0x9, 0x2}, {0x1, 0x3f, 0x9, 0x2c}]}, 0x54) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100000001, 0x40100) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x7, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:53 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x7f, &(0x7f00000000c0)=0xb63, 0x4) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x7, 0x36d) [ 221.950915] Dev loop4: unable to read RDB block 1 [ 221.955972] loop4: unable to read partition table 03:25:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x42080, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 222.049135] loop4: partition table beyond EOD, truncated [ 222.060999] ldm_validate_privheads(): Disk read failed. [ 222.066442] loop5: p1[EZD] [ 222.069385] loop5: partition table partially beyond EOD, truncated [ 222.097276] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 222.141945] loop5: p1 start 1 is beyond EOD, truncated 03:25:54 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$vcsn(&(0x7f0000000a80)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x4000) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000a40)={0x7, 0x79, 0x1}, 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000ac0)={0x79, 0x0, [0x1, 0x2de6, 0x9, 0x8001]}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xbf4}}, 0x20, 0x6}, &(0x7f00000002c0)=0x90) sendmsg$inet_sctp(r3, &(0x7f0000000a00)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x8000}, 0x1c, &(0x7f0000000800)=[{&(0x7f00000000c0)="cbca6d381c993a1503d93142741224e97fd8022121b223b313c0ce88e3ea104852bab8e9009464f81a83a46058c6d26816b4d091b2dfe263e0041f156c66520b7a73dc0b5ef2b94b8143e3d167d2d888049670cf3aaea546e7da6448bc30f8d4649d8a54e6d8b2b818d508ec15d860f4bc39c045ea0b968698ff9330a4c0cfc074f476f398e1c60368f9d83026f1218b81ddc8610282013f8a0257313ad3028c0ac6ce21b22f060da078d68a13fd33fc94e9489c885fd18330a4a2108ec9bafce9c325c9884305d0890d555beb17459c35", 0xd1}, {&(0x7f00000001c0)="6652164dc7940a9d14a1d20d56e4fd80dc328b47986cda09a00fe8b4b3a02f5a80b008242e77843baa5c775624fe57902ed4b2459af50cef3f9354f3b7fb755ddafbc84b54f0aaaccb25fa20c27d8a849453", 0x52}, {&(0x7f0000000340)="13f4e3bc41cf21ee92733db12cec32e6cd9c8167e80a49b5bb72b4cf1e1b53234757a14c38a7d596cc02940a637585c1b10800b7375028520b825ea8db313eefdde87c21c4a339f55b6c58188f82e6b586bfa39df8c364e16f664076f9ed6f568cfaf2353ce2025e705b69da5d5ad15ff7de5880959a0ef619d8ae0627d1586fdc5d761b7e480166897098b29548513b0213ec6465aca339064db348cc1da782853cc65e31468be06f4ded67df6cb1ac389ce8a108233709dca3b904c94618fd25553c93dabdb1181a7be7d9211f28f8ebd4fa6e3ec4084ac2369315f6a46df179c81e39f6f48735145ee845c4a9b715baccab", 0xf3}, {&(0x7f0000000440)="3d28148d072cb10cc42b8a247e1e65eb5cb3bddac5fb08b423b63702717bc77287ebf021b2f047c72eb0084ffbdec08d385797efd50ca09d0337264c4ce1770973a003051f2e4579785ff3f37c12dc20cf01552ca311cb8f44febe65cc67310df6f3ae456ded7d889c6a5ae7186a7061d918b201191f595dcd7475a1675988485c753a7cb95c93a8db1543c9452a591d9ea567e8125cab6db832d42419a61452ad9ef0de5770654d602744ee28c5c45a68dcfa4c37bedf53b6a615b6e1862df1bb7f5662e5cf2ee2d4aa8468c2d9c393a414d23da53c0609d11a5556900f9566c777e63b2d16df2ebfa0ce75e7f8a23b58f1935fbef2e67ad5", 0xf9}, {&(0x7f0000000540)="57e8f3f3dd4b5adee62b4a9432c56b16b7c23d1c2e9a0467f45942fed45836273820f1734140b03db7f886504c8f9040a280647b25271a4aa262f86bf6a53444f9585616b236ae271eaabee537f944168cdf366bc16e1561df1af790ce690a9fbea20cfce34c8cd9c1f749838258f2a1220d3752fb8967ecf699d9af6e6a06dc4f0075b917948b66d0", 0x89}, {&(0x7f0000000240)}, {&(0x7f0000000600)="16ed9f005ede2978cf861dd1196a8c1e43817c7b816fa927c590ee8de95d961b5145de4a4d48090b49f7e6f34b03e7e6e88c2188293cd8433ac231ab4fa942a108eb1d692f4f2bdbc03c42290042cc88dde85773d18abeec8143cd0d5e79ad78cb720e5796cd51e87feec25e316ac2b4bbda4da445755e3e46a78a108efd5a4f5be7882f7fd34d984846c598fb416b6153b8c0e674260a3dbd6bbda05afcf9ad72bb13dda28c5bbb9817d817af4837638bafe1456dc6e75ead5f9807665d6f6e537df04cdd4cc694966ce254", 0xcc}, {&(0x7f0000000700)="c6f00e0cd97493d6fc1c8d9127bbbc588d88be248d69afa12751d5c9ab6d39b95a641de97fbe3eebaa19dc3e60086076b902ba0f8ead10ae84617371d43ee4a66118f865a973ffe22e97fdcc974a795d809a555d9d4a83c4d6cbd65b7dd2e81bfce7b876eb4041f64e7837746e90b65dceff52fc836142eed95c5a1c8e79c41ee408617465c6a58aa7951cd0eb04158595cd0841751276f1a6fedeee3ac6914dd1927186610535be303fef5310bf58afb0dd809fa80d226faa760587ddc634121031e1157aeafe2ab07e1774a86ca5c6d3242d7b538b89f948e2f972c6717551503d815179a51a7397e8aff607d75016ad4b", 0xf2}], 0x8, &(0x7f0000000940)=[@authinfo={0x18, 0x84, 0x6, {0x24}}, @init={0x18, 0x84, 0x0, {0x8, 0x5, 0x3, 0x7}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="b34b29080e983df076cf90fb13f280c5"}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0x2, 0x1, 0x1, 0x800, 0xffffffffffff0001, 0x3, 0x67, r4}}, @authinfo={0x18, 0x84, 0x6, {0xffffffff80000000}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}], 0xb0, 0x4000000}, 0x20004090) 03:25:54 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 222.232277] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 222.260121] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 222.290447] loop1: p1[EZD] 03:25:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10040, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000040)}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:54 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 222.394873] Dev loop4: unable to read RDB block 1 [ 222.399857] loop4: unable to read partition table [ 222.434980] loop4: partition table beyond EOD, truncated [ 222.468181] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 222.530955] ldm_validate_privheads(): Disk read failed. [ 222.537028] loop5: p1[EZD] [ 222.565603] loop5: partition table partially beyond EOD, truncated [ 222.614963] loop5: p1 start 1 is beyond EOD, truncated 03:25:54 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:54 executing program 0: r0 = fanotify_init(0x34, 0x101000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x208201) fsetxattr$security_smack_entry(r0, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='selinux)\x00', 0x9, 0x3) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000640)) fanotify_mark(r0, 0xf5, 0x9, r1, &(0x7f0000000040)='./file0\x00') accept$inet6(r1, 0x0, &(0x7f00000005c0)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f0000000280)}, 0x10) fadvise64(r0, 0x31, 0x3, 0x3) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000140)=0xffffffffffffffc6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000580)=0x7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$UI_DEV_CREATE(r1, 0x5501) 03:25:54 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 222.681961] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 222.704628] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 222.718645] loop1: p1[EZD] 03:25:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{0xffff0000, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0xfffffffffffffffd}, {}, {}, {}, {}, 0x4}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000040)={0x40000001, 0x8, 0x1e}) 03:25:54 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) write$P9_RLERROR(r1, &(0x7f0000000040)={0x2b, 0x7, 0x2, {0x22, 'bdw\xcdtrusted\x8drutedsecurity)eth0ppp1'}}, 0x2b) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) rt_sigsuspend(&(0x7f00000000c0)={0x80000001}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e27, 0xfffffffffffffffc, @loopback, 0xfffffffffffffffe}, 0x1c) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) write$apparmor_current(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='permprofile securityvboxnet0(ppp0%%cpusetmiae_type#\x00'], 0x1) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 222.881939] Dev loop4: unable to read RDB block 1 [ 222.887891] loop4: unable to read partition table [ 222.944847] loop4: partition table beyond EOD, truncated [ 222.981461] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:55 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="a98fb691076ab6664db66e53f924000045a7de154f0700df00"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000000340)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) signalfd(r0, &(0x7f0000000040)={0x713}, 0x8) mkdir(&(0x7f00000001c0)='./bus\x00', 0xfffffffffffffffe) 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x377, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$getflags(r0, 0x403) [ 223.051041] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:55 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 223.101893] ldm_validate_privheads(): Disk read failed. [ 223.107774] loop5: p1[EZD] [ 223.120605] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x6, 0xfff, 0x81, 0x5, 0x51e}) [ 223.146802] loop5: partition table partially beyond EOD, truncated [ 223.167853] loop1: p1[EZD] 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 223.198033] loop5: p1 start 1 is beyond EOD, truncated [ 223.203598] QAT: Invalid ioctl [ 223.228402] QAT: Invalid ioctl 03:25:55 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:55 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 223.290784] Dev loop4: unable to read RDB block 1 [ 223.295708] loop4: unable to read partition table [ 223.295765] loop4: partition table beyond EOD, truncated [ 223.315769] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x32, r2, 0x705, 0x70bd29, 0x25dfdbfc}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:55 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x480, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 223.551973] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 223.562255] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 223.572942] Dev loop4: unable to read RDB block 1 [ 223.578185] loop4: unable to read partition table [ 223.589602] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 223.596295] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 223.602639] loop4: partition table beyond EOD, truncated [ 223.608572] loop1: p1[EZD] [ 223.611943] loop5: p1[EZD] [ 223.615200] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 223.624508] loop5: p1 size 2047 extends beyond EOD, truncated 03:25:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x3c, &(0x7f0000000280)}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) 03:25:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) accept(r0, &(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000000c0)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@mcast2, 0x65, r1}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffffffffffd}, 0xfffffffffffffd49) 03:25:56 executing program 2: semget$private(0x0, 0x1, 0x20) r0 = semget$private(0x0, 0xffffffffffffffff, 0x20) semop(r0, 0x0, 0xffffffffffffff9f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x3, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r5 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xd9e2, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000900)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() getpid() fcntl$getownex(r4, 0x10, &(0x7f00000004c0)) r7 = getpgrp(0xffffffffffffffff) r8 = syz_open_procfs(r7, &(0x7f00000006c0)='net/tcp\x00') ioctl$TIOCGETD(r8, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fc020000000000000000"], 0x2a) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e774218c8d16630ba969464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf605660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d70000000000000000000000077ee524f532791daf35eaac938ac7606008d875ed29edb8a735230fa0355966a81b5f37a3909fc50537472d3cb4f6f8f30dd1828e985e10313915c445569a66e23db81997ec72c96b47b19293064ae59748129cbb7205c826351149dac7f866227d2aca2d7e22ac30010f8331920111ad1ddfa2fbbba4d9c3dfbbf31b7b5d45ee9d3b4740af8bce4d7277c55d3c059028e62d8c1c5a77f"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3015cf63ee466a17abdb3f603325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089ee8aa3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a00bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r9 = dup2(r8, r1) ioctl$TCSBRKP(r2, 0x5425, 0x3) write$FUSE_OPEN(r9, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl(r0, 0xfffffffffffffffc, &(0x7f0000000000)="54fefceeb9596ef7b8ccb312ef2742aeac1525d8a5c6a6265f94f71ff3530b831ee99351c39d24ca5b3985ab735fa2eb7601016a9b7574d837205bc726da05784ed04c8c0fd52220f77150fed0859efe9ce487b744b612af59cd6d7b942032531542db1ed4121fd85d52ef3d269a14a3e1") shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 223.886405] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 223.925703] FAT-fs (loop2): Filesystem has been set read-only 03:25:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400801, 0x0) 03:25:56 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000000c0)=@routing={0xfd, 0x8, 0x2, 0x4, 0x0, [@mcast1, @loopback, @mcast2, @mcast2]}, 0x48) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 224.061766] Dev loop4: unable to read RDB block 1 [ 224.078938] loop4: unable to read partition table 03:25:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getuid() 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 224.107263] loop4: partition table beyond EOD, truncated [ 224.138934] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000180)=""/229, 0xe5}, {}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/137, 0x89}, {&(0x7f0000002500)=""/96, 0x60}, {&(0x7f0000002580)=""/221, 0xdd}], 0xa, &(0x7f0000002740)=""/132, 0x84}, 0x401}], 0x1, 0x40000000, &(0x7f0000002800)={r1, r2+30000000}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:56 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 224.211374] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 224.239049] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 224.289781] loop1: p1[EZD] [ 224.292343] tmpfs: No value for mount option '¶3±Êäçµµf—ÝAH@o' [ 224.363233] tmpfs: No value for mount option '¶3±Êäçµµf—ÝAH@o' 03:25:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x10001) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) r4 = shmget(0x0, 0x2000, 0x1182, &(0x7f0000ffd000/0x2000)=nil) openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x8080, 0x0) shmctl$SHM_UNLOCK(r4, 0xc) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000200)="798a65e25875596ed794b2658eb323878f05d385f2f06f1ec3ed210ba1152a66832e908cd12b987ee871069d073dd8762bb44388a9fa2d7afac4888f9a325c1a758e892a2f14f731e53c9615c675073f533d76f44bf7d677ebb6ae7b8bbdeb6f154e0c2812864d9dcb33bc1223821707d7708383090d3dce47ff5d2406d37561852554c4ad9d", 0x86, 0x7}, {&(0x7f00000002c0)="c2abfc86c9751438f4ee39b7424da8950080a5d4e0bef798633d62ea6865d5d3ab34f4ceb6c3c312df90a282000f82c74f772fa6cee53826619b7e64458c8eff4e6f3a0b7ed1ee9e9c03cd6a4a31b6511070fed4933552bde56143b40273b72b7238d8bf349397ccaffa0f8285ecd414a71e706cd6d7e861dbae65a4255ca066bbc9da3ddd02a0e597649bf13fda4f0e1af3996a03ad341fea43d42f9900bf119d39975be530bbf842191b48105892d27c21498da34fadfe89862c483611c65668d4add60e20ebd9d19ef4e6219a0a6cbfac92bc5be9ac286338af4637e7ef00b51d851596d72b3f65e12f86f28b80", 0xef, 0x5}, {&(0x7f00000003c0)="9c58d15df3015d1ba9c831f8ae033302d2ee61dae2191edaa8197282272c5eac668a47cf68a4bcc9bcb6", 0x2a, 0x1}, {&(0x7f0000000400)="c81aaaca2285bb0f439cc6bb9b676b70d266dbb5c27609f6a6d3398ebba0597c961bcaeebd02a888652227bb49fcc29d518f501ae476d81f8c7d5659d6c4e936e886cd1d4ee7f11f53c6152eeb9d38535f9bb1ded17e64b36e636534fadad1edad8bc74c9fc993bec99ed9b16c524d481de39cdbc5c0bd730bbafc0e931c18982149de0ee4aa9540e7c0dd80e782dc6457f5016b", 0x94, 0x9}], 0x20000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 03:25:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @loopback}], 0xfffffffffffffee7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000880)='/dev/audio#\x00', 0x4, 0x28040) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000008c0)={0x0, 0x3ff, 0x3, [0x3ff, 0xea, 0x7fffffff]}, &(0x7f0000000900)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000940)={r2, 0xa2, "5bef1a5ccc4154a803d290be9eaf7ee48ec1807077fafdf4c2d6a597b1e33b89cbcc9df15e82f0d862d5c1ff7d2d60282fddb5503836d83e02c4369c8dd753e72d7337aaf852d87d9a7353d43d4fba0478be06ffc05dbcb005b1c9816b9ecc81b1ae039c0b7773bc1e506cf63c07a159e312cce4fdb1f4b85bf88cc3bce1d84f4c3c4f235d8b110a4f8d8fb49f42a38673ce9305d60317fb366c199f1fd357297bab"}, &(0x7f0000000a00)=0xaa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback}, 0x1c) [ 224.441097] Dev loop4: unable to read RDB block 1 [ 224.446208] loop4: unable to read partition table [ 224.470797] loop4: partition table beyond EOD, truncated 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0xdaf5, 0x0, 0xa1d}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000000c0)) [ 224.494119] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:56 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20100, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:56 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40080, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000140)={0x9, 0x3, 0x3, 0x2, 0x0, 0x1}) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xfff, 0x408601) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 224.651030] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 224.668933] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 224.679452] loop1: p1[EZD] 03:25:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1ff, 0x288000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x2, 0x4, 0x2, 0x6f01, 0x1, 0x707, 0x2c63c406, 0x0, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0xff, 0x4}, 0x8) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 224.715629] Dev loop4: unable to read RDB block 1 [ 224.721866] loop4: unable to read partition table [ 224.747430] loop4: partition table beyond EOD, truncated [ 224.753743] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x10, 0x80000) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000000100)={0x20, 0x1, 0x5, 0xffffffffffff0001, 0xfffffffffffffffe}) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) 03:25:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x7, @rand_addr="0f3523b51f9a10c91b34bfb41065061a", 0x100}}, 0x81, 0x8, 0x1000, 0x8}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x1, 0xb4, "bcc4ca88bbe4e4ae614a33ef3e33dee0012b02e5930c02e012f84e480a2b912c58920c39d9e4303e40ebe420b10725f7760e847cb9d1a2c96ed57e828d92105761c0b31f989cb47b19a913510484f1fe32e1ee91aa4f7c15785be6e840eeaa4990d2682d242c2b3adbd510c5ce31b563e89643b128b14044c401c5df6cb1959d2655253ec27787e4611beb6ff42cd9f91f620edf8499d4e3bbaf5d1db3948fc950431eafd2217c5c78360384d97ae1b9baa05fca"}, 0xbc) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)) 03:25:57 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000180)={0x5, 0x0, [{}, {}, {}, {}, {}]}) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "1f851784b791feb55a5c8bf6792dc04ba54977c2"}, 0x15, 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x2, 0x4) 03:25:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000000c0)) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000003060d01ff0488fffdff7f57ffccad000c000100060d00100919020002000000f6f00061"], 0x28}}, 0x0) exit_group(0x0) 03:25:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000340)={@empty, @multicast1, 0x0}, &(0x7f0000000380)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xe4, r2, 0x2, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xff}}}]}}, {{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x669}}, {0x8}}}]}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x1}, 0x4008010) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x2}, 0x1c) 03:25:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0x7, 0x4) [ 225.438264] Dev loop4: unable to read RDB block 1 [ 225.447768] loop4: unable to read partition table [ 225.478823] loop4: partition table beyond EOD, truncated [ 225.502995] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 225.511616] Dev loop5: unable to read RDB block 1 [ 225.517737] loop5: unable to read partition table 03:25:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0xf4240) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 225.524964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.542694] loop5: partition table beyond EOD, truncated [ 225.565026] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:25:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:57 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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") lremovexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '-\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/146) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) [ 225.591243] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 225.607917] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 225.615219] loop1: p1[EZD] 03:25:57 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000700)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000000, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'security.', '-wlan0*em1selinuxsystem-\x00'}, &(0x7f0000000100)=""/40, 0x28) dup3(r0, r0, 0x80000) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1f, 0x1a1102) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}], 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xd7c, 0x0, 0xffffffff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x27c}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x2, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000000c0)=""/231) 03:25:57 executing program 2: r0 = open(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x3e1, 0x3) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2}) ioctl(0xffffffffffffffff, 0x0, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x6) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x841}, 0x4004080) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xffff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000500)={r2, 0x81, "b487d861c9853b46526ef1d9c60d11d014934a270fcfc06468196ab3c78b68825b700a1162853d2e5b69d836fea9beea922dae9f7325130d5c0a1572cc05bd872f25463f01d8a229d6ddcc964dea14ccdfe2b23a29443842e69f3774b0c7fbfe252a5858488fc313efcc808e274c938cb485269cbfc164308d3234af9ddfeb5b29"}, &(0x7f0000000240)=0x89) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x0) [ 225.820814] Dev loop4: unable to read RDB block 1 [ 225.828157] loop4: unable to read partition table [ 225.850816] Dev loop5: unable to read RDB block 1 [ 225.855726] loop5: unable to read partition table 03:25:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 225.869790] loop4: partition table beyond EOD, truncated [ 225.876975] loop5: partition table beyond EOD, truncated [ 225.895015] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 225.907910] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket(0x40000000001e, 0x1, 0x0) getsockopt(r2, 0x800000010f, 0x82, &(0x7f00004ad000), &(0x7f0000a3c000)=0xffffffad) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) 03:25:58 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 225.971271] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:58 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000040)=0x200, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$capi20_data(r0, &(0x7f0000000100)={{0x10, 0xfffffffff000ba5b, 0x0, 0x82, 0x5}, 0x2f, "cf33bd1fdb269acac3ee9935881245b35d960f0f03e848c6728b3d14e5da7dd8e798becdb00a220691ed89d5764e49"}, 0x41) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e1f, 0xfffff7fffffffffc, @local, 0x8}, 0x1c) 03:25:58 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000500)) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000000)={0x8000, 0xfef}) [ 226.022890] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:58 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:58 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80280, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x3, 0x0, 0x3, 0x7f, 0x7ff, 0x5, 0x6d, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x80000000}, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000340)="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", &(0x7f0000000140)=""/33}, 0x18) [ 226.082251] loop1: p1[EZD] 03:25:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400000000000072, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0x4, &(0x7f0000000140), 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000600)={r0}) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000640)=0x4, 0x4) 03:25:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {0x2, 0x0, 0x3}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x17, 0x0, 0x0) [ 226.156455] Dev loop5: unable to read RDB block 1 [ 226.162625] loop5: unable to read partition table [ 226.168905] Dev loop4: unable to read RDB block 1 [ 226.178843] loop5: partition table beyond EOD, truncated [ 226.188441] loop4: unable to read partition table 03:25:58 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x1) 03:25:58 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x2, 0x3, 0x7, 0x101, '\x00', 0x90}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:58 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 226.207954] loop4: partition table beyond EOD, truncated [ 226.218431] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 226.247092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:58 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) migrate_pages(0x0, 0x6, &(0x7f0000000400)=0x96e, &(0x7f0000000440)=0x3) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() r6 = getpid() r7 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000740)=""/227) r9 = gettid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) sendmsg$unix(r1, &(0x7f0000000700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="367bf0c799c6f7bd03c45e1d92670213b563ee70f184439ead02de21b38f2fc894952f3dc90ba0c821fa6f24ff2959986da40e4fd58c8b31ea416ffd3a1ceb435def9d7e0d936ffe9a5a3b1487a8912e04f0112f48f012d0436aa5e5ef2e70b4eb248621895b07416257d37dd2c19d592a0250fbef182422d9eec6cf32d97cbc3b56c1f8fa1e10cfa93043e6c862b0b508ae657698f6f6d51a49a27aa36be5a4e5b571a4952d36035c", 0xa9}], 0x1, &(0x7f00000005c0)=[@rights={{0x34, 0x1, 0x1, [r2, r0, r0, r1, r0, r1, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x2c, 0x1, 0x1, [r2, r2, r0, r1, r0, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r1, r2, r0, r1]}}, @rights={{0x28, 0x1, 0x1, [r2, r2, r2, r1, r0, r2]}}], 0x128}, 0x20000000) 03:25:58 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x7fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) shutdown(r1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a, r2}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 226.412113] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 226.435859] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 226.445389] Dev loop5: unable to read RDB block 1 [ 226.452154] loop5: unable to read partition table [ 226.457322] loop5: partition table beyond EOD, truncated [ 226.475320] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 226.475818] loop1: p1[EZD] [ 226.509414] Dev loop4: unable to read RDB block 1 [ 226.516204] loop4: unable to read partition table [ 226.535874] loop4: partition table beyond EOD, truncated [ 226.552212] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:25:59 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x226500, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x1000, 0x4, 0x1, 0x401, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r1, 0x8}, &(0x7f00000002c0)=0x8) bind$vsock_dgram(r0, &(0x7f0000000340)={0x28, 0x0, 0x2711}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xc, 0xfff}, 0x8) 03:25:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40202, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) r3 = dup2(r1, r0) connect$unix(r0, &(0x7f00000000c0)=@abs, 0x6e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0xfffffffffffffff7}, &(0x7f0000000200)=0x8) 03:25:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x100000000}, &(0x7f0000000100)=0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:59 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_TSC(0x1a, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x4000100323, 0x6, 0x0, 0x0, 0x0, 0x200000000000000}) 03:25:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0xffffffb4) 03:25:59 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) 03:25:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x100000000}, &(0x7f0000000100)=0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 227.098124] Dev loop5: unable to read RDB block 1 [ 227.103421] Dev loop4: unable to read RDB block 1 [ 227.122097] loop5: unable to read partition table [ 227.122278] loop4: unable to read partition table [ 227.132408] loop5: partition table beyond EOD, truncated 03:25:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 227.149089] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 227.164253] loop4: partition table beyond EOD, truncated 03:25:59 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0x1d, 0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='ecryptfs\x00', 0x0, &(0x7f0000000440)='\x00') mknod$loop(&(0x7f0000000000)='./file0\x00', 0x258, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x101) 03:25:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0xfffffffffffffffe, {0x10001, 0x9, 0x3, 0xfff, 0x40, 0xd5}}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x1ff, @mcast2, 0x7a4eda8d}, 0x1c) [ 227.190964] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 227.206298] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 227.214226] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:25:59 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 227.241364] loop1: p1[EZD] 03:25:59 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 227.297599] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:25:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000400)={0x8, 0xffffffff}) pipe2(0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001900)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4004) prctl$PR_GET_FP_MODE(0x2e) unlink(&(0x7f0000000280)='./bus\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000200)={@mcast2, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@remote, 0x6b, r3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000080)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x100000001, 0x6, 0x5, 0x8, 0x19}) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000480)) getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f00000006c0)=""/80, 0x50) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x1600, 0x3ef, 0x2000000, 0x3f00000000000000, 0x100000000000600, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) prctl$PR_GET_FP_MODE(0x2e) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000240)={0x100004, 0x0, 0xff, 0x9, 0x5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x80a48202) lchown(0x0, 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000680)="50bfbf9a93ca3aa179cba2") getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80841000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x320, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4008000) statfs(&(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0)=""/187) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008040, &(0x7f0000000740)={0x2, 0x4e23, @empty}, 0x10) [ 227.338917] Error parsing options; rc = [-22] 03:25:59 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 227.363127] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:25:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0xffffffffffffffff}, 0x1c) [ 227.421486] Dev loop5: unable to read RDB block 1 [ 227.428456] loop5: unable to read partition table [ 227.433825] Error parsing options; rc = [-22] [ 227.453658] loop5: partition table beyond EOD, truncated 03:25:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000100)={0x200000000007b, 0x0, [0x10a, 0x0, 0x10], [0xc1]}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000040)=0x11) [ 227.478467] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:25:59 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1fffffffffffff65, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:25:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x150, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x692e}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc94e}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xde}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff3861}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2a6a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x157}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6f2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x24008000}, 0x800) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x10000000000, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 227.610852] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:25:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000942000)={0x2, 0x1000000004e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0xfffffffffffffee5) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b80)="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", 0x240}], 0x1}}], 0x1, 0x4000000) [ 227.653354] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 227.694234] loop1: p1[EZD] 03:25:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x200, 0x10) 03:25:59 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 1: r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:25:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x150, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x692e}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc94e}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xde}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff3861}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2a6a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x157}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6f2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x24008000}, 0x800) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x10000000000, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:25:59 executing program 2: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x122a, 0x1) [ 227.826698] Dev loop5: unable to read RDB block 1 03:25:59 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x802, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 227.850676] loop5: unable to read partition table [ 227.868572] loop5: partition table beyond EOD, truncated 03:25:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = dup(r0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) 03:26:00 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x511000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e21, 0x80, @loopback, 0x8f3}, r1}}, 0x38) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000269, 0x10400003) [ 227.920843] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 227.974632] audit: type=1400 audit(1564716360.025:63): avc: denied { ioctl } for pid=11382 comm="syz-executor.3" path="socket:[40882]" dev="sockfs" ino=40882 ioctlcmd=0xae65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:26:00 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:00 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:00 executing program 3: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x20000000000031, 0xffffffffffffffff, 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 03:26:00 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="01000000cf5da2bcffc2144c227786654324f8021bde4019b7dfe5471e98c274542a3de54e936345247c90c4afa6c67544b54a273f3cdf80cb309f70eb"], &(0x7f00000001c0)=0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:00 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x8, 0x1, 0x2e8fe159}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000005c0)) syz_open_dev$admmidi(0x0, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000100)={0x0, "0114f683ff5697c507390cb874e9269468ac2e1354aa124544ba48b4da48fd7f"}) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) socket$alg(0x26, 0x5, 0x0) close(r4) 03:26:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x1ff, 0x6}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x5, 0x201, 0x80, 0x8, r1}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x229) socketpair(0x19, 0x0, 0x400006, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000200)={{0x100000000, 0x400, 0xfff, 0x4, 0x890, 0x2}, 0xfff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8001, 0xa000) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0xe) [ 228.171642] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 228.197944] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 228.243349] Dev loop5: unable to read RDB block 1 [ 228.248436] loop5: unable to read partition table [ 228.259623] loop1: p1[EZD] [ 228.274863] loop5: partition table beyond EOD, truncated [ 228.283638] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r2, 0x5352a9d8, 0x1000, "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"}, 0x1008) sendto$inet(r1, &(0x7f00000001c0), 0x0, 0x20000000, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:00 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="01000000cf5da2bcffc2144c227786654324f8021bde4019b7dfe5471e98c274542a3de54e936345247c90c4afa6c67544b54a273f3cdf80cb309f70eb"], &(0x7f00000001c0)=0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:00 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:00 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 228.307523] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 228.338401] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockname(r0, &(0x7f0000000000)=@tipc=@name, &(0x7f00000000c0)=0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 228.412457] loop4: p1[EZD] [ 228.424733] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f0000000340)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x9c1, 0x0, 0x9}]}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000180)=@tipc=@id, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) [ 228.522839] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 228.531016] Dev loop5: unable to read RDB block 1 [ 228.536098] loop5: unable to read partition table [ 228.543882] print_req_error: 185 callbacks suppressed [ 228.543888] print_req_error: I/O error, dev loop4, sector 1 [ 228.580397] loop5: partition table beyond EOD, truncated [ 228.588829] audit: type=1800 audit(1564716360.635:64): pid=11458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=11 res=0 [ 228.621025] print_req_error: I/O error, dev loop4, sector 1 03:26:00 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 228.626815] buffer_io_error: 184 callbacks suppressed [ 228.626821] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 228.649709] print_req_error: I/O error, dev loop4, sector 5 [ 228.656062] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 228.663787] print_req_error: I/O error, dev loop4, sector 1 [ 228.669522] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 228.677293] print_req_error: I/O error, dev loop4, sector 5 [ 228.683210] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 228.691080] print_req_error: I/O error, dev loop4, sector 1 [ 228.692653] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 228.696823] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 228.696933] print_req_error: I/O error, dev loop4, sector 5 [ 228.707012] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 228.713964] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 228.734361] print_req_error: I/O error, dev loop4, sector 1 [ 228.740270] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 228.748090] print_req_error: I/O error, dev loop4, sector 5 [ 228.753988] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 228.761744] print_req_error: I/O error, dev loop4, sector 1 [ 228.767584] Buffer I/O error on dev loop4p1, logical block 0, async page read 03:26:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x48]}) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r3, 0x406, r2) sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"/381], 0xf0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 228.775510] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 228.819784] audit: type=1804 audit(1564716360.675:65): pid=11465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1 [ 228.849850] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:00 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 228.894235] loop1: p1[EZD] [ 228.948201] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 228.981335] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 228.989708] loop4: p1[EZD] 03:26:01 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 228.999088] loop4: p1 size 2047 extends beyond EOD, truncated [ 229.062322] Dev loop5: unable to read RDB block 1 [ 229.068728] loop5: unable to read partition table 03:26:01 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:01 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 229.113752] loop5: partition table beyond EOD, truncated 03:26:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x9, 0xffffffffffffff07}) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x1, 0x23, 0x2}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) [ 229.158374] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:01 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 229.317942] audit: type=1804 audit(1564716361.365:66): pid=11516 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1 03:26:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f0000000340)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x9c1, 0x0, 0x9}]}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000180)=@tipc=@id, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 03:26:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x3}, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 03:26:01 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 229.387934] audit: type=1804 audit(1564716361.405:67): pid=11465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1 03:26:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180), 0xfffffffffffffef3) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 229.470584] Dev loop5: unable to read RDB block 1 [ 229.475495] loop5: unable to read partition table [ 229.483180] loop5: partition table beyond EOD, truncated [ 229.491163] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 229.499625] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 229.522781] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 229.531551] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 229.541104] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 229.556629] loop1: p1[EZD] [ 229.566469] loop4: p1[EZD] 03:26:01 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:01 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x121400) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}]}) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 229.586142] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:01 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:01 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 229.708872] audit: type=1800 audit(1564716361.755:68): pid=11542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=12 res=0 03:26:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x2000005d, &(0x7f0000000280)}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x3, 0x20}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x400}, 0x8) 03:26:01 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 229.827446] audit: type=1804 audit(1564716361.755:69): pid=11542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/211/file0/file0" dev="loop3" ino=12 res=1 [ 229.855606] Dev loop5: unable to read RDB block 1 [ 229.865168] loop5: unable to read partition table [ 229.907167] loop5: partition table beyond EOD, truncated [ 229.940007] sctp: [Deprecated]: syz-executor.0 (pid 11575) Use of struct sctp_assoc_value in delayed_ack socket option. [ 229.940007] Use struct sctp_sack_info instead 03:26:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x48]}) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r3, 0x406, r2) sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"/381], 0xf0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 229.949961] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 230.041696] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 230.065214] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 230.111885] loop4: p1[EZD] [ 230.128348] loop4: p1 size 2047 extends beyond EOD, truncated [ 230.223221] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) 03:26:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000200)={0x14, "9e5056cc4b8047ebaa8aa80978f52d7fc58bf85f"}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0xfffffffffffffe4b, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000100)=""/2}, &(0x7f00000001c0)=0x78) 03:26:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) timerfd_gettime(r0, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xa2, @local}, 0x1c) 03:26:02 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x8d4) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x900000000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) setuid(r2) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x2, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685, &(0x7f0000000280)={0x1, 0x8, 0x1000, 0x9d, &(0x7f0000000100)="13e7a0866bdefe9ee48ace9c007dc1f8ad03d4022a126e801a92aa41a3c80296e01406a1948412af87d6485d6ea210a538849ad74869b80c8e7177239b601fab89621f412c73586ec4cd02a5ebd0b77e187466f36f71710f7c71bab03368cb8228c2344a0869e91bd20063bf4801f48d6dcba699c6535d8b2c1f69c2bffe07aba527717ab2f3ca48f4ae34b77dba00135d1ea63608481741a6a320acfe", 0x8c, 0x0, &(0x7f00000001c0)="9a129ebc5760d566cef36f6a00c394dbbae2adb02b0685e23eda0155a8f7b92c725ef7c677ab3d307a663393272c7263421c96cd43856ed6d667e61d5a7c2bb9b49272f5992ffc43ae5ef01e44391a3277a3636ccff46bb5218a6c274fe4d1e3c63b1ed13a9acfd542c04a8552666446f308a706433940a4c9354113310e80b0061d66fa74f45483fa1f0b47"}) 03:26:02 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmsg$sock(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="88ff28e0304ad3601354aaa6fc60a64e7925f2348806d4d2fde91dc77d5ed96005612c1c812d991277f6ba792ba15a5438b1a7e81fe315f4553dfbbe7a70b202d48654f477c110cff870e1b5fa8b3ca3881c284b70c2813cb94571dec76cdd16ee06c67af99afde2b4de1831fd849f13df57911f35584e2ebe6a50e5907f9ac8ab58b7b562e826b16a312333be53bfa2e667b9904b2f2799a40ad9d21bb5c46b702b0a423c44f7c71f3b3fbcb993b805b589fb6622cc42f7abd0c4bc", 0xbc}, {&(0x7f0000000180)="d7bfe44b010b7e82e905871de87111225a4dc362328d7cd16c2f5bd2cb43efa2abc4e1711db51771fcd620094a47d23c5cbf95b107ba5f20cc71bd6a645fe6d46be33b", 0x43}], 0x2, &(0x7f0000000240)=[@timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0xb35}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7ff}}], 0x78}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0xfffffffffffffff7}, 0x2c) 03:26:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = gettid() mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x13) close(r2) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) timerfd_gettime(r0, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xa2, @local}, 0x1c) 03:26:02 executing program 3: creat(&(0x7f00000001c0)='./file0\x00', 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x7ff, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 230.613023] Dev loop5: unable to read RDB block 1 [ 230.618172] loop5: unable to read partition table 03:26:02 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000000)={0x400, 0x20001000, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x28b) modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) [ 230.660094] loop5: partition table beyond EOD, truncated [ 230.685338] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x590}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x8}, 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0x7f0000000, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x300, 0x0) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x3) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000140)={0x8, "585c170da52e257c3530ab3f1c6a0d91038d529586321df3a5e3190746182724", 0x1, 0x1}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x15) 03:26:02 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000001300)=[{&(0x7f00000001c0)="b276a86074904aacf18ebddf7fac04a7f04363e108905b7ce7dae42ed308a06216c523cd875f560093106ec57f0c6f45c4b2fd022cc8ab6b8aff2be0cf98bf499c52edd1e5300a05c476d4b7f7fdd63c56ee266bd55dca741a16307ae6d7628350a2b0cb5e23cdd891b563b2bf81edee614357a4654e3895d12dc14b11082aef9a3e086e85864e70615c18be15caaf74e4619ab02e31c704cbc97375780b068a5233387ad32a9239095f394cd24efc39ebaaf225459de768b4a7332c44d2", 0xbe}, {&(0x7f0000000100)="977b4632ba12deb4a1924f374b80a78c44d280bcb75b07b50f36293c398b613d60e30624205a55e46b3d34dbdc9e7a9ec63fc53c8e1786beda9d6dd7edb89a798a81c9d763054019331069", 0x4b}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="4eae973b1fe9371caee03bf3895a00b404f577b2ebd085501d47d20af9785b8b65a210daa314e51db7c45de8c1040311453a1762b59ed9382e901fdbbb373d18f9b57bf766a85feffdcf6daae732228fa71eab87f1daba2cf8a738372a1a85c40d5d6e8f69147824c438598dfc", 0x6d}], 0x4}, 0x20000000) r2 = fcntl$dupfd(r0, 0x406, r1) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 230.712308] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 230.719912] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 230.741514] loop4: p1[EZD] [ 230.753927] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x100000001, @rand_addr="ff1355dcee91ee1b903ecb1f05813e7f", 0x3}, 0x1c) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x101002, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 03:26:02 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:02 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, &(0x7f0000000340)=0x1c) fcntl$notify(r0, 0x402, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000001c0)={0x0, 0xb1c, 0x7, {0x5, 0x7}, {0x0, 0x5}, @period={0x5a, 0x8, 0x7f, 0x65, 0x7, {0x1, 0x0, 0x5, 0x7}, 0x1, &(0x7f0000000140)=[0xc007]}}) eventfd2(0x9, 0x1) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x800000000001, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) [ 230.876973] sctp: [Deprecated]: syz-executor.0 (pid 11674) Use of int in max_burst socket option deprecated. [ 230.876973] Use struct sctp_assoc_value instead 03:26:03 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 230.988163] Dev loop5: unable to read RDB block 1 [ 230.998994] loop5: unable to read partition table [ 231.015975] sctp: [Deprecated]: syz-executor.0 (pid 11692) Use of int in max_burst socket option deprecated. [ 231.015975] Use struct sctp_assoc_value instead 03:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) [ 231.046548] loop5: partition table beyond EOD, truncated [ 231.081705] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:03 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x6, @mcast1, 0x5}, @in={0x2, 0x4e23, @rand_addr=0x100000001}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @broadcast}], 0xfffffffffffffdff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/42) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x3, @loopback, 0x2}, 0xfffffffffffffe21) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f00000001c0)=""/101) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x20, 0x1}, 0x401}}, 0x18) 03:26:03 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flock(r0, 0x8) accept4(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000000c0)=0x80, 0x80800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf8, r2, 0x302, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffffffff0000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20004014}, 0x20000080) [ 231.175857] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 231.205791] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 231.264546] loop4: p1[EZD] 03:26:03 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x8, &(0x7f0000000280)}, 0x10) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000c00}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r1, 0x531, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x7, @loopback, 0x8}, {0xa, 0x4e24, 0xbd, @remote, 0xfffffffffffff800}, 0x8, [0x6, 0x7f, 0x145d, 0x7, 0x8, 0x7, 0x80000001, 0x6]}, 0x5c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001640)='/dev/sequencer2\x00', 0x100, 0x0) connect$x25(r2, &(0x7f0000001680)={0x9, @remote={[], 0x2}}, 0x12) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000847000)={&(0x7f0000000380)=ANY=[@ANYBLOB="380100001a0013070000000000000000fe8000000000000000000000000000ff00000000000000000000ffffac14ffaa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x7}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x7ff, 0x5, 0x1, 0x8c}]}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f00000006c0)=0x35f5) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @remote, 0x1000000000}, 0xfffffffffffffcbf) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000200)={0x1, "8cba8d1a86131f6d2a979cdfa731d33adea928db56405ed36019a60972b36c86", 0xa, 0x2, 0x401, 0x1, 0x4}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x100, 0x0) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x4000, 0x1}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) [ 231.287285] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munmap(&(0x7f000001f000/0x2000)=nil, 0x2000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) syz_open_pts(r1, 0x8000) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)={0x93, 0x7fffffff, 0x4, 0x8, 0x6, [{0xfffffffffffffc01, 0x8, 0x10000}, {0xfffffffffffffffe, 0x6, 0xd, 0x0, 0x0, 0x400}, {0x7, 0x4, 0x0, 0x0, 0x0, 0x202}, {0xb3, 0x4, 0x5, 0x0, 0x0, 0x2000}, {0x6, 0x4, 0x6, 0x0, 0x0, 0xa0a}, {0x800, 0x0, 0x15, 0x0, 0x0, 0x3e82}]}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x2) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @initdev}, &(0x7f0000000280)=0xc) bind$bt_hci(r2, &(0x7f00000002c0)={0x1f, r3}, 0xc) write$vhci(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="0433340aedb225f3c8fa76d9f1432fac64ac4110db6360652a89949a05aab75661986a12b23a71cfa75ff3044f077c047e883c2dabfd2a2f5ff7ffab2941ed31baa1cd6ace905a628ecc6f76c8989e7fea6cb15da18136dae77e62f767a7862f69fa712d0ab6a073fbd1cfd5bca9f2204de44bdc5485b614033b23815ed9aaaafd57795124b17dbad60a5ea8092b7ad86d1351bcb9d49d7a93f5ca2d29a26d33b5b253f6f94f15c22303c851842b8e4b520907c16952b8e38450417c6d21df58a60a6fc10e35bc998f417795d2f969df663420c000d5842a9ad56376fe5946a9361ba8c1a68ca50450816633922b7f670b6daa264b"], 0xf5) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r4 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000300)=0x3) ioctl$TIOCSIG(r2, 0x40045436, 0x3e) [ 231.411180] Dev loop5: unable to read RDB block 1 [ 231.416165] loop5: unable to read partition table [ 231.453882] loop5: partition table beyond EOD, truncated [ 231.486734] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:03 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) r4 = semget(0x0, 0x0, 0x55) semctl$SETVAL(r4, 0x2, 0x10, &(0x7f0000000000)) 03:26:03 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:03 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000180)={0xf, 0xb11c, 0x4}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0xffffffffffffff1f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r5, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:03 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:03 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400001) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x80, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffc6f) connect$inet6(0xffffffffffffffff, 0x0, 0x3d8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x14d6, 0x28000) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x329, 0x0) r3 = accept(r1, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000000)=0xfffffffffffff772, 0x4) ioctl$void(0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, 0x0) shutdown(r2, 0x200000000001) recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000) 03:26:03 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'bond0\x00', {0x2, 0x4e21, @multicast2}}) futex(0x0, 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) [ 231.769318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:26:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca1055e0bcfec7be070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl(r1, 0x3, &(0x7f0000000000)="11c5387000000003000000") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x16c) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000380)=0x9) syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) write$P9_RLOPEN(r3, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r5, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r4, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) [ 231.870638] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 231.872925] Dev loop1: unable to read RDB block 1 [ 231.885183] Dev loop5: unable to read RDB block 1 [ 231.886839] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 231.894934] loop5: unable to read partition table [ 231.900457] loop4: p1[EZD] [ 231.904777] loop1: unable to read partition table [ 231.914165] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:04 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) [ 231.915901] loop5: partition table beyond EOD, [ 231.920957] loop1: partition table beyond EOD, [ 231.925759] truncated [ 231.935500] truncated [ 231.938792] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 231.952687] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:04 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:04 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 232.186676] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 232.203161] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 232.209380] loop4: p1[EZD] [ 232.216705] loop4: p1 size 2047 extends beyond EOD, truncated [ 232.253820] Dev loop5: unable to read RDB block 1 [ 232.258739] loop5: unable to read partition table [ 232.258798] loop5: partition table beyond EOD, truncated [ 232.271541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 232.282793] Dev loop1: unable to read RDB block 1 [ 232.287721] loop1: unable to read partition table [ 232.292871] loop1: partition table beyond EOD, truncated 03:26:04 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) [ 232.295605] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 232.307660] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca1055e0bcfec7be070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl(r1, 0x3, &(0x7f0000000000)="11c5387000000003000000") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x16c) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000380)=0x9) syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) write$P9_RLOPEN(r3, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r5, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r4, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 03:26:04 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:04 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 232.522091] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 232.561194] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 232.590732] Dev loop5: unable to read RDB block 1 [ 232.597693] loop5: unable to read partition table [ 232.609500] loop4: p1[EZD] [ 232.612691] loop5: partition table beyond EOD, truncated [ 232.618861] loop4: p1 size 2047 extends beyond EOD, truncated [ 232.623680] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 232.644691] Dev loop1: unable to read RDB block 1 [ 232.649898] loop1: unable to read partition table [ 232.658342] loop1: partition table beyond EOD, truncated [ 232.664234] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) 03:26:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=0x0, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e20, 0x2, @mcast1, 0x80000000}}, 0x1f, 0x81}, &(0x7f00000003c0)=0xfffffffffffffff0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0xfaf5}, &(0x7f0000000200)=0x8) 03:26:04 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff0000000000000, 0x4000) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8, 0x12, {0x0, 0x0, 0x0, 0x11}}]}, 0x24}}, 0x0) 03:26:04 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:04 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:04 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0xf2, 0x7fff, &(0x7f0000000100)=0x5}) write$P9_RSYMLINK(r0, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x2, 0x0, 0x1}}, 0x14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x21) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 03:26:04 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) r1 = socket(0x10, 0x2, 0xc) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000000c0)) write(r1, &(0x7f0000000000)="1f000000010aff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f) 03:26:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x4, 0x401, 0x302, 0xd45e, 0x8}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) timerfd_settime(r1, 0x1, &(0x7f0000000200), &(0x7f0000000240)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:04 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2000000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000100)={0x8001003, 0x7f}) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000440)={r2, 0x80}, 0x8) sched_setattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) bind$netrom(r0, &(0x7f0000000480)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000380)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x1f}, &(0x7f0000000300)=0xc) unshare(0x40000000) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000500)={r2, 0x338b}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000002c80)=0x9) [ 232.874573] Dev loop1: unable to read RDB block 1 03:26:04 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 232.898675] loop1: unable to read partition table [ 232.921385] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 232.930415] loop1: partition table beyond EOD, truncated [ 232.940709] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 232.951915] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 232.964426] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:05 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x1, 0x0) r1 = socket$kcm(0x2, 0x4000000002, 0x73) connect(r1, &(0x7f0000000080)=@generic={0x0, "b2298a0d07a150d9a3ac5babe1f58429c390d0c32be9adbefd7c7bc2cdab4065835155846a924d4333c055d7ad461ae82b823a90b23ee0e250b6246f107dc14c82ab8b61c6af885b065e88bef8c63dc33fb7053b9a7c2080200684134e454b01e15674444f4f2f67097899fe9786275c1537ff96a850c5e913df63477172"}, 0x3a) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc4c85513, &(0x7f0000001480)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 232.975183] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 232.976373] loop4: p1[EZD] [ 233.016361] loop4: p1 size 2047 extends beyond EOD, truncated [ 233.066326] Dev loop5: unable to read RDB block 1 03:26:05 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:05 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) [ 233.092332] loop5: unable to read partition table 03:26:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x6, 0x2}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r1, 0x8}, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = dup(r0) recvfrom$rxrpc(r1, &(0x7f0000000540)=""/94, 0x5e, 0x1, &(0x7f00000005c0)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x5, @local, 0x10000}}, 0x24) sendmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0500"/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000340)={0x5, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "eea9a76841849d7d"}}, 0x48}}, 0x0) r3 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000440)='vcan0\x00', 0x0) keyctl$get_security(0x11, r3, &(0x7f0000000480)=""/176, 0xb0) sendmsg$can_bcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x6, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "afad0ba330c263d0"}}, 0x48}}, 0x0) [ 233.135031] loop5: partition table beyond EOD, truncated [ 233.174962] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:05 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 233.231931] Dev loop1: unable to read RDB block 1 [ 233.251489] loop1: unable to read partition table [ 233.267810] loop1: partition table beyond EOD, truncated [ 233.299391] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 233.314224] IPVS: ftp: loaded support on port[0] = 21 03:26:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x3) connect$caif(r1, &(0x7f00000000c0)=@rfm={0x25, 0x9, "58c2b8da9db269362262c530204db2dd"}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x7a, 0x3, 0x0, 0x606d1c6e, 0xfff}, 0x401}, 0xa) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) [ 233.360814] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:05 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 233.409340] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 233.416280] Dev loop5: unable to read RDB block 1 [ 233.426304] loop5: unable to read partition table [ 233.435690] loop5: partition table beyond EOD, truncated [ 233.440598] loop4: p1[EZD] [ 233.447537] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 233.474441] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:05 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 233.623411] Dev loop1: unable to read RDB block 1 [ 233.629283] loop1: unable to read partition table [ 233.645614] loop1: partition table beyond EOD, truncated [ 233.651980] Dev loop5: unable to read RDB block 1 [ 233.657053] loop5: unable to read partition table [ 233.662866] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 233.676062] loop5: partition table beyond EOD, truncated [ 233.697662] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:06 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2000000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000100)={0x8001003, 0x7f}) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000440)={r2, 0x80}, 0x8) sched_setattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) bind$netrom(r0, &(0x7f0000000480)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000380)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x1f}, &(0x7f0000000300)=0xc) unshare(0x40000000) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000500)={r2, 0x338b}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000002c80)=0x9) 03:26:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_access(r1, &(0x7f0000000200)={'system_u:object_r:var_lock_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x4}, 0x63) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x68040, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000000c0)={0x6, @output={0x1000, 0x0, {0x7500000000, 0x3397}, 0x1}}) 03:26:06 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:06 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:06 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x11, 0x9, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x1}, [@typed={0x8, 0x1, @fd=r1}, @typed={0x8, 0x2, @binary="84"}]}, 0x24}}, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000140)=0x8) recvfrom$llc(r2, &(0x7f0000000200)=""/166, 0xa6, 0x2062, &(0x7f00000002c0)={0x1a, 0x8, 0x7fff, 0x4, 0x3ff, 0x106, @dev={[], 0x1d}}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x3ff, 0x6}, &(0x7f00000001c0)=0x8) [ 234.309559] QAT: Invalid ioctl 03:26:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x4b564d03], [0xc1]}) [ 234.336207] QAT: Invalid ioctl 03:26:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f00000000c0)="e9ca445aa71ba25d02dcbaf9c0d363a7daed1bde24a918628cb738d48ac22a744aae00a196f4fdc00c4689b3e2b457adf6012fd74a75196e32b9a97fedf0a4686dc67884e6110b350ef2ca30899636858757d8721d625cd85b97d4a79722326ef8ece2697a1515cb4cfeb5c3eeebd4ed967ea2fbe97da72181d9c027fc93394da5dda9f5a520e09bbc6edc8e25294a571cf27639c8f10be4cfd23f909b920299873c5f7c8ce601304a213f6af81d874f822aee9870ac204f06bb5d3e78768acf164987b86012448bd1ccab7f", 0xcc, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r1, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x1b, 0x0, 0x80) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e24, 0x10001, @dev={0xfe, 0x80, [], 0x25}, 0x4}}}, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0xe0, @loopback, 0x1000}}}, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 234.413461] Dev loop1: unable to read RDB block 1 [ 234.426523] loop1: unable to read partition table [ 234.447711] loop1: partition table beyond EOD, truncated [ 234.461051] Dev loop5: unable to read RDB block 1 [ 234.466379] loop5: unable to read partition table [ 234.484004] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 234.489542] loop5: partition table beyond EOD, truncated 03:26:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x38) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sessionid\x00') sendmsg$tipc(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000500)="a40e1ffa011f85ab5d0b6a37f20c328c03eba746be8f9e6c192c9143983f2c380372902404ca36d4d420601a5bd11c0ffc51f422a162ea3b9bc2f55c79cf7d930f3835122920798c6b70af3015f419927edbffba0fd3a64a1c9b6d358b68e954c7e01508a8ba07ef5ccda47f8aeca9363c227156fdf30c90a254f83751f799fc2ecf5c4c7fd5965b917808c5511da6586772d3ffdeed76f8fd0c1aed254296380dcf26e4f2f22b418500d51742f059e011a0eb4385dc", 0xb6}, {&(0x7f0000000040)="e4f22d17863a02ed948775bfdead463dccf400c6472507c2a7ba90a665d64ed3376a919547aec2359573921c5e", 0x2d}, {&(0x7f00000005c0)="e3570f0617b17a510e8e1aa19d3927220d46d78eea73c39d865796ba6d7b2eacc7a66b6ece138c64cca49eadc3037f1df5c479284de2bc2f331b9023d6376f74c16c3a53fb8a8c3d1f445453c6539f56aeaee2f8dccf60810c4b65932f", 0x5d}], 0x3, &(0x7f0000000680)="bf7451b8236edef0d210e3ff962d2e512a15e09e6b18a5188fb6f029f19937c644222760e0c1253727c068beed0ee594f65a35d738b1e9fb1d2dbc0d2e47ec577e957775cc748f6d58796d60deaf8eea15f2808262fb26cd026ee7a4d5d6dca17bed9d0fd69c9ed7a296274a9b59", 0x6e, 0x40}, 0x4000000) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 234.511776] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 234.516586] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:06 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 234.557983] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:06 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 234.602018] loop4: p1[EZD] [ 234.606860] input: syz1 as /devices/virtual/input/input5 [ 234.627906] loop4: p1 size 2047 extends beyond EOD, truncated [ 234.721504] Dev loop1: unable to read RDB block 1 [ 234.735203] loop1: unable to read partition table [ 234.741166] loop1: partition table beyond EOD, truncated [ 234.781390] Dev loop5: unable to read RDB block 1 [ 234.781503] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 234.786321] loop5: unable to read partition table [ 234.786382] loop5: partition table beyond EOD, [ 234.808929] input: syz1 as /devices/virtual/input/input6 [ 234.817055] truncated [ 234.819629] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:26:07 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='comm\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, 0x0, 0x0) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) fchown(r3, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="0a617e09c26a9c995b09e802e25a6eafecc53e5b403a7f976e174ae3563c079c63955c6ed3f29b436c5c07bfeebe998e305a5285ba83588f49f3e5", 0x3b}], 0x1, 0x8) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000001}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r6) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 03:26:07 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x40000) move_pages(r1, 0x7, &(0x7f0000000040)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f00000000c0)=[0x401], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:07 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:07 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:07 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x4) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x1, 0x4, 0x3, {0x3, @sliced={0x2, [0x3, 0x8000, 0x80000001, 0xdb2d, 0x8c, 0x5, 0x3, 0x1, 0x4, 0x7, 0x6, 0x0, 0xab17, 0x5, 0x15, 0x1b40000000000000, 0x5, 0xfffffffffffffff9, 0x6, 0x2, 0x9, 0x0, 0x1f, 0x1f, 0xfffffffffffffffc, 0x9, 0x101, 0x7ff, 0x2, 0x400, 0x0, 0x0, 0x8, 0x100000000, 0x2, 0x10001, 0x10001, 0x8, 0x80, 0x3ff, 0x2, 0x6, 0x6, 0x0, 0x4, 0x10000, 0x101, 0x1000], 0x5}}}) r1 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040)="4b21c9f3286024b0e97bc0bb877997c50d438b0f5df30e12bf29fdf4560e56beb6640ad8a0bce2c8a22a93", &(0x7f0000000080)=""/220}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x1810}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) 03:26:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) mount$9p_xen(&(0x7f0000000000)='@em0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x10, &(0x7f0000000100)={'trans=xen,', {[{@cache_none='cache=none'}, {@afid={'afid', 0x3d, 0xffffffff}}, {@debug={'debug', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}], [{@obj_user={'obj_user', 0x3d, '!\\proc)keyring.proc]'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'user'}}]}}) dup3(r1, r0, 0x0) 03:26:07 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001640)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRES64, @ANYRESOCT, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="bf0fba5fe8b4c5a5e6bf24c486f2672086f854c8d393219c999734e7c7e9fd11b16905cf5aa21fdd81247cfe0acc31025dd8ebe0d503780baff2df3fe9", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="67414e43b1eed0633a38c95605af8864e8cc7ed5638130131c9c4953fcca52b3baf966dc783b332725b7b66cff67354889d5a47549093e3c1f8c1c423fe671ef11b6ad22c225ac5cd99f4a3b6edae0a3fc935422daa9a86e49a03ee4c2943b29f8cc39502a0ed2abc8ad99c7b4330d88e63b31737048662441f14ec4d6c7f6c440e253918cd2d20d3f6792cd83b1f02e8d24ba1e57d738c5714409d0a4412ba2e2e8df06d1d03a61454e8bc472d7828b38e3", @ANYPTR, @ANYBLOB="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", @ANYRESDEC, @ANYPTR], @ANYRES16, @ANYRESDEC], @ANYRESOCT, @ANYBLOB="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", @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES16, @ANYRESDEC], @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="5a5431b0c6f15652f6ade94b600eabab54dbd3f23bd2d136cf4dc24a29bb46e72258f5cb65fd74580b673401fb764cc69a5ba2e2e2bb8e882c1603f6125bedc0f67b6f4fa9f8a136c1f552b9035a4fde68b11ac4925f3740a60248df287caab4f0f2e241e72ac6ee10a9ade99821d2c40047292bf748836d7ca647b2378a23f80c12efb00598036de330ba23431d9e6692d5114bfd28139062ab55e121cd237ff2970022ab9b1078a9b240219d4282112167b53c4fc929dfc86a6f1b1dd35906cc103c684cd7076cff61b17a104d2103470826d5d9cb1115f6f23c6e0c15fe3365550e64c031b57da6dcbd54142d438312644b9613a65902fc2a4b5fa80c53986e9879ba025479b6ed9f3dc64f3d56a96a844f8faddae108a72c95555b01cec6843839cad3eef0e76005dfc5323f4f34d585df117437109f32cf927d05a0339346b9c051de41da74a242438edb0d744fa4e26b99af38af6ccb7bc88f92a270c31f8e6a3ba599a06048d3d32ced492dbea0eab29e8a9d5345430bd353fbfd76dfdc1db60d38f43cb6e35a8b87a4dd0df0137484eeb9dfa7a9f9f02a92a5611185a27162725e26cd736d47c7a94133d8726d7fa6d60d98a7025cab35910bd7f5761e6b2e8c0ccaa87a43a14f49f5bbd83512ea015bd5050bdd8af4ac913df074a77490960a70420e46fc3625c2c98fe3a6e295686756e9f98106757334ab0103f512ea3f04ca31b6bd19632517e76eec76144217fec255d89a3797aea24b5219f894d1f08ad31cdee370a98541e618006781a758069b95440b91df5d4c72c2c42cc302cc28c15a331b9646e5e7d4daf1b988609fda33e829de96edcde162262ccfa3d692318a068ba519b5c7289e3e4ec49ef280a50d76d06fad0a1efce833314f1796b5179bfef65ead780dceca48c4113b7f0099c9c77d68cde6519ee3929e036b83c42de75b15689e4caa2eedf4407936bd36f4d295667475b627ef26ece8c86450c08d01d486b7ac0995ceb2de9cf5bd479625d58f3725218a5386d418b4e548019b07f4d973ef0d4517f0afdc57077c86dc933383d271f25218478fec0fd63de2b813036662a234479710772e12245dc7268fcef4107f28887e43ea4074b88750ab63d6cac1d8fbe912beef6d566000baa7ca56e431d4d5ac179157e44b65bd8f0c18375013eae74e337279b545d7910e98dfce1a5c3046e1a68df428735f52021aa22eac9e167dd3b31d1eb8cf9654f365400c6c0e32d2ae0a222a6c05d2fdd8bc5493fe5d30758dd0513c386706d4f6a72a4fab9d292e40f5126ffedb0bcbfcd0dfdaa43b1fab11752cab58e143e5d61c746596c7e1e467dc3dd05db75f07a1f8db8e73f6ae4849e3143953ab89b317ee4a2b5419c9c3805d90cc29bd79137455cf1911451a80ac12f764e108c85accf054e69b826de037d8bc51c061f979def83aba01f63fb8b9fc597b675f7d56e3b9c6abaa69be4e6ad9a3e86ca530908b543359766e542077d274fec37687a389ac8169e1a74ccca87a50af6314caf196c5170c642b2e0bfb6fe0213b8a2dfb25f6620130d21a605a83df737dab58c1d013631085d776936cf98dfce09f87a26900ddf70646d6ae2c75ff7037b16468447e395dea507fdb57eff13b2bd3867a55de57e9d70aef0fd2d9421301642a09a11f688483c734701327caed61b8636b6ad603c80382d20c79f2d853d72785197808a67af03ce097ab907a7b1e225551884606525ee3a4b96646cb486aa2c21f682f8a4921b2c742d14f27d8913bf9f8130d1f9697791201d14af68902e4744b1efad8b0fc0420ba8a66c5b0913a98b6afd2cbd020756cf5e0a822466330c4cd1771ba9a326215c7e3388c818562637827b129c2919c8fdf73fea68cb3a9be883e90a05addd1b491e4982a2c066b9050cd2af99aded51d812343fecd3011c810b339fac863d30661f76bfa0e86a10820e85fe1572104ffff12afe4ce719926d84ecdd6a7b9de42bfc0eb646cc698b21f0f0fd41d8fbe262cf2e947d586909115866e16a8fdc2f23d434553f759d8f539a181ed82e1b30d1617a11bf261c00a65850d04b0671900a5c0961191236e7b787fb9151388230f8fa1cebae681f11f2e0ddcda05af8e583189b78303af7177b9c7937f35e74be10738e4be26b49c06f5c9f3e8c3d2b6252377fef64e6b45ca4a6793606e77dee88796c7362367f14139af8b613ec6cfbdb5d9f4e175f1ede3dbbc629d0fb3fb2595247305b63ffe75d7cef6cb3a08ab1c3cf26b6288957c048b7993773cdc4ab1ec69a0eaeb8effe46f4907e4fb901e8ed67d7dbe652cae68abca79e5a4312221703a9a5366b4b63294741bb958c5762577d186aea844f83cb085cf36b84e05abea3a109ac880918949e4271b3848beca219bd30b8260b48bb60ce870477b17224cc123b8d0a2b19ac64c0491735a5846790fa49dfc91e863746662050bf63dc82d1bc006494387d7c0f6b816006308fe677f9209e5ba076b750d65c6b20f9e9e2b0acbcb8468da7a18d82f1802fc1bbbf52e02d11fde180771cbccbbeb46a4c39e164f51ce76f05f43530e0d51ab5775941810435545bd42ca80b5ddbf226a8924fca43c4b18b30d4c0b46abbec27b3ef7e44c4c96f138f789e5ed8d62b41badee87e8f4656d09c7238651437440fd043b522f517c2527b6934215d80570fd146e7f9fc32196f07b7f1d8413170747e904a9c71bd8c9172f59459dde4af4555698757813615102817a41262a138903978f83643da03311e25773dec1fa0e663fed6599a03c9428c53fef06b0d41b81781ab7bb313e72aad183262d5cb3775a575828f4730e95b8c1b1413c0abeea38fc8818802ccce1f5a6e7d0cbd6a6bf8a34f150c66890764b1df2e3230ec37401dce1705ec2245d5e131c99c6b2f9b60a32d2964af432e0e97e8d7ed07c2205474a833428e1743df269defc68229674bae71763d3f7c44765eb50a75abb8d4e7a9b12dc7fa8ecbd8f6cd4df8a7c920aa38276dba3720132f72dc07dcdb15f18d93f24ec7d3760aa38542fb6e6bfba5229859b038953b96d6761661fa3549ed42eb3ed636015b40f79cc37e1ba93c7132cdc0e78ae7d5ad73feefe5010d7e7f611914803d801a8dd568efa0db962075e3af000306d4fcca018802c5f58d952199c3cbc6b23ffcdeafcd48fb8d5abe2f63cf2b3b40b22e5f5a43e459fdf86212a9cd129dfd69cb706d268468178f559c495233699b349ad5e6b3e8b0eeb031f6489abcfc45b48c944020229da536b89db964e9e05292e65d5f72460212b390d52fc8342773347851b445de4ef84db735fcd7465443a7124fc14b360961368869e732266a96db8b2ccb3daf8b66d0ccb2beca5a6dea70310c737a84504f78d78aec598b178acc351193969f98c38b8f703dc7856743e4bad51097ba73ec3376b12c8bd9dab46df9977af31e11cfc6276085e53af92a0ac2d681cc6d77e8c7956425123c15bc4446e93cec8d3ebdd738c03a3ff1831f83d6eb2a579144b512da2046376433082e974f357abc341375d4a4f2d0abc5b2e4595bd657bf113cbecb229e0419c7ad0e3ecfd25fe84e27e2a7a77803546a1f238eeba884ca96cab8c7e5c5b25a69ad7537dbf41c3b269d0e51185a37611686598dcf20941f22f8a27860b53b0065a3667a110a77b4a8e7ddfb167a955ac36ea42dd3ddcf69e21fa42c5ac5c568de670075319a2fc832b6db92710d264722c12fd2ffde9a5bd1cc43181cc08ce1604a1cb616fdb53410bb7f14383e0982ffc6cdfa43a97c6e7c9095abe3f4e60ad7e55b3899fbae87710605aac26f9df2070a30b26fe6200d83cd789b0f0a3702f2f3b8c6abdd5f0a662fa1f83f9c5c7ff65cec67666c08e45a19d3c8c6643c8ec956859e7a606d42ffb0a0b80cb89fe79cc833b56db54bdca6695d53279021b6e1c71e3540f8a9d5caca793ffde06efb94af82bbb2beb234e95ba66218c08c8391ea29a164448825a62ceb2eab94d5c5513eaa3f495406d220a4322ffaec25fe234673282d8c698fac7da6d1ec3fe0765117c1c5d454fec1a2a149f094d38d23483d2a149afa62378171653065bcf92f0402f1e66be582d0b6e2f8c1db0bca129ce75db423200137f11884e0c181ba6d33f3306a159933b746d45c4433f07220f6343f2fae8987bb66ca47cba8bb3b3a4e7ef79af9e521b7f8b78e6f81f4860898e2955d8d9d95bb64648a2b59d964a4ed7324c54a1651af49eef73cd4992763fab281fdfb0cfba1b7e5a944068de993c2ae116aaf122ae12f332761e488927a9c0ac1db2060c36dac7c80cdd90ccb2ae0ec99f4c70d5621be925fdd55002c84a7e8f66be89f4bf0f2b084769c58c20fa325b114cbbbd5ccdac9071b74d2f908cd7fd5f974b4103af5a688e712cb97ebb1179fcf0e854b8acc6b38c96fe049a8235f5691a8244d3cf98558e168a837f7426bbc05cd1fc508f24a395b06280762dc794acdea7820a97db544111c027cd098e6652ce4b74f2420a390f5960c921000aa7d41648d4ddc9f24cf62ced95b358faa52130d7df379cb0ae692916e2419a15ef4393519ad646ec44a0f6ca84bb8c9b8b5952c27f96787b77ca6fbd6bad4eefa394bb2ff5a726ac8f33f6aee1c173ac8bcc5a7676b78325d818d48ec88b1792dd6bb565da99be734ddf9c1827aa984cccd21b1506e572b15079fc8101fce1e99b335c21607bc41609a8f79a17012d184406cc7f183961ac6894adac8d78b6628b43b85390ec57d8b7103d414ca85d1013543aec090c69452f9b077448279b2cf4cd0c7a85b1655459b26b9dedbde57a61b09405a692688afe761b1e53bd9e17c1d104a45357b35ed68d4efdbed68a176b88411e15a415dbfe53efd320090171c1e92b94e46eb91d7757d258672e337d27041a6535ee08dd91564464bfca362b9cefd0d6fa574eb303b5c5f8a8d282c9335602eb7fa64476786251b26cae8a0277cd8b53d5fea800ca84e28a643fec81f644ed4e6a6a146b70d373fdd0f124b69e86b5f2f22d2327a293a488426c73070b8c0908805925375945ffe578b038c1a2a4acf471bd2bbb54061793cb50d41435efd5c23c551ab489d7f1891157ad553823b69b3934b8bb41a8fc8c45c9a298793635da01a3e08a4ed659c668f569092dc55a4722e3d332510d2bd427f63565cb413de2dca19b8a522f036e65383c74e01f3a88c5b5be71d1683ba73f4deffa280e8dc201200343d08edb7d8d4aad877602d38222c4fe7e696f80a952dc1b7a6eb1d17f4d91346daa0e55d6f2ea6428e641875e3904875d6ca7e0c7e434f0f1ebf8c0cd268a7bf148b318456fd69a167512fd84f6178199b78a23787f763df1544519ff451809e10f24e5abac654994550c8cc12c345c61619cc108b129ebcad8ce5d942a8fddd191cba986c9dc81634b9fdea4dec7456ad84f1084a0054cc41af5662c8be939a385c3c382401a4077a8f01ecb6a6301aae77f85d34b84043922939a2d52bc5991d31536c5185d5c80032e9b0f74c0162d6aebee8071004235dc49db612c949424ac4e8f2dd109e0d09928629e5da1b7a4334aca1a709251807aad9e53c2266126057f14c81ff6b07b3ee0611dae59f9bb540dcf2726ea5ac1dbb1eedd8e8b092e1971e4c8d0ed080f487a2b5730b2e68e1f16ab4394d764c5d97a472df0a18f86d387c53384824bb2c3f09d1424d9e9527f96b1d61bf9ee059fb73012290cf27feca75e438280e7feda7fdafe6eff358138e27c4ddadfe271986f72c2b034", @ANYRES16, @ANYRESOCT, @ANYPTR, @ANYRES16], @ANYRESHEX, @ANYRES16, @ANYRESOCT, @ANYPTR, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRESHEX], @ANYPTR=&(0x7f0000001580)=ANY=[@ANYRES16, @ANYBLOB="c22d9b36bc953f89357fce727d5b7d56c46f3ba2bfd7868c5a76e4fb24779d79328c65670c0d371b", @ANYPTR64=&(0x7f00000014c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYRES64, @ANYBLOB="584fe92ac3e15a7da51d15bf6eeb9ff47756417b25d3db721ee789a43149", @ANYPTR], @ANYRESOCT, @ANYRESOCT, @ANYBLOB="b173bb63c18fe44791add4381d8ff4888736f910c062be5b3c44450cbf0552d451865c08f9cc3d39bd", @ANYPTR64, @ANYRES64, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESHEX], @ANYPTR=&(0x7f0000001540)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR]], @ANYRESHEX], 0xa}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0xc800) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 235.240945] Dev loop1: unable to read RDB block 1 [ 235.245978] loop1: unable to read partition table [ 235.276552] loop1: partition table beyond EOD, truncated 03:26:07 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 235.305774] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x101000) [ 235.351376] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 235.383855] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 235.396514] loop4: p1[EZD] [ 235.406546] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:07 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:07 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = getpid() r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000080)=r1) prctl$PR_SET_PTRACER(0x59616d61, r1) 03:26:07 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000000)=[0x5755bb4, 0x8, 0x6, 0x5], 0x4, 0x8, 0x6, 0x9, 0xfff, 0x7e97, {0xfffffffffffffffb, 0x4, 0x4000000000000000, 0xffffffff, 0x4, 0x5, 0xfff, 0x0, 0xfffffffffffffff7, 0x6a6, 0x9, 0xd57, 0x7, 0x400, "4ba03dfea8063dbb7bf5716da6603c89e9ecc313b7e893bba5fb9e78cd66cac7"}}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @empty}, 0x10) socket$rds(0x15, 0x5, 0x0) 03:26:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\a\x00\x00\x00\x00\x00\x00\x00'], 0xda00) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) sendto$packet(r3, &(0x7f0000000080), 0x0, 0x8011, &(0x7f0000000340)={0x11, 0x1c, r4, 0x1, 0x8}, 0x14) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(0x0, 0x0, 0x0) getegid() stat(0x0, 0x0) stat(0x0, 0x0) getresgid(&(0x7f0000007340), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 03:26:07 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 235.662580] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 235.672888] Dev loop1: unable to read RDB block 1 [ 235.679588] loop1: unable to read partition table [ 235.688158] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 235.695927] loop1: partition table beyond EOD, truncated [ 235.706858] loop4: p1[EZD] 03:26:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$binfmt_elf32(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x6, 0x800, 0x100, 0x2, 0x2, 0x7, 0x40, 0x3e1, 0x38, 0x39d, 0x8001, 0x6, 0x20, 0x1, 0x0, 0x1ff, 0x40}, [{0x4, 0xfffffffffffffffa, 0x7, 0x10000, 0x0, 0x73fd, 0x8000, 0x4}, {0x70000000, 0x2, 0x4, 0x2, 0xffffffff, 0x3ff, 0xcb, 0x7fffffff}], "2e9cfb39ce8b4c8d7d9db28934ad67f3c1799e4d402f54862c033ed5121a0945f170dc71d7603cf096dc4381a3a199eaba1684cabc5ebf8f60daf36ed7b4c2562c211eac3c6760d0a004d18374e2bd8145ae32b46a02073f9677649e67cbfe8953191940db321d1c80c11e36238f2cc805682b6d4ca37c1ce075f546dbe56d9a3db85f03862ff5c2488580e802d4f4ff43f5a458827c67797cbd2a83cd07ea423ccf03ed148943b6c9c649773f434476533d055695771f8e7705c4b2922482df486d541ebebf15161c4c33216c7368cffda87862ae410db2a618", [[]]}, 0x252) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:07 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0xf169, 0xe3}) [ 235.712525] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 235.724437] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:07 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 236.051290] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 236.071876] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 236.095137] loop5: p1[EZD] [ 236.098784] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x333, 0x3c) 03:26:10 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0xf7, 0x8, 0x4, 0x9}, {0x3, 0xfff, 0x5, 0x27}, {0x7, 0x5, 0x9, 0x3}, {0x8001, 0x8, 0x4, 0xa99}, {0xfffffffffffffffb, 0x46, 0x4, 0xfffffffffffffffb}, {0xa588, 0x8000, 0xe37, 0x1000}, {0x8dc, 0x10000, 0x3ff, 0x8}, {0x9c8, 0x7, 0x20, 0x5}]}, 0x10) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x104e23, 0x2, @mcast1, 0xffffffff}, 0xfffffffffffffd17) 03:26:10 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') preadv(r1, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001a00)=""/148, 0x94}], 0x2, 0x3c) 03:26:10 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x95, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:10 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x200000, 0x0) fcntl$dupfd(r1, 0x406, r0) 03:26:10 executing program 0: socketpair(0xd, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140)={0x9, 0x10001, 0x1f, 0x4, 0x7f, 0x8, 0x8, 0x2, 0x7, 0x7, 0x49}, 0xb) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0x10900) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x3, @local}, @in6={0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0xb}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @loopback}], 0x68) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000280)}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_buf(r1, 0x29, 0xca, &(0x7f0000000340)="b33ed0a55385b2424e51636c767bebba70158739f36db6d78a630f0064cdf5d6811864138c6cfdcc4a525838ace9bc8e6e2d762c6c70f7fb90436c060a95ab0fb06b3ad66d01cf8ce3ae952acaadb4c0d2cd88f36c791b4647b7a44f3199d6e28bc304f0", 0x64) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf1}]}, 0x12}, 0x1, 0x0, 0x0, 0x3ffd}, 0x40) 03:26:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 238.470849] Dev loop1: unable to read RDB block 1 [ 238.475881] loop1: unable to read partition table [ 238.497747] loop1: partition table beyond EOD, truncated [ 238.513571] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendfile(r1, r0, 0x0, 0x10013c93e) [ 238.540753] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 238.559082] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 238.570460] loop4: p1[EZD] [ 238.575045] loop4: p1 size 2047 extends beyond EOD, truncated [ 238.604610] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 238.604620] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:10 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 238.684821] loop5: p1[EZD] 03:26:10 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") 03:26:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendfile(r1, r0, 0x0, 0x10013c93e) 03:26:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xafc0}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) lseek(r0, 0x0, 0x0) [ 238.708874] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:10 executing program 3: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={0x0, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) prctl$PR_GET_NAME(0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) syslog(0x9, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000004c80)=[{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x6e, 0x90}, {&(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x804}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 03:26:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000001c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) close(0xffffffffffffffff) 03:26:10 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 238.856275] Dev loop1: unable to read RDB block 1 [ 238.868968] loop1: unable to read partition table 03:26:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:26:11 executing program 2: getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 238.894706] audit: type=1400 audit(1564716370.945:70): avc: denied { syslog } for pid=12572 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 238.908382] loop1: partition table beyond EOD, [ 238.949690] truncated [ 238.953677] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 238.965340] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 238.983431] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 239.014690] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 239.053510] loop4: p1[EZD] 03:26:11 executing program 3: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={0x0, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) prctl$PR_GET_NAME(0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) syslog(0x9, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000004c80)=[{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x6e, 0x90}, {&(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x804}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 03:26:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000000c0)=""/103, &(0x7f0000000040)=0x67) 03:26:11 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 239.078280] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:11 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) [ 239.165716] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 239.183288] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:11 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") 03:26:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x6) [ 239.262168] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 239.324439] Dev loop1: unable to read RDB block 1 [ 239.336549] loop1: unable to read partition table [ 239.343350] loop5: p1[EZD] 03:26:11 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 239.367470] loop5: p1 size 2047 extends beyond EOD, truncated [ 239.379985] loop1: partition table beyond EOD, truncated 03:26:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) get_robust_list(0x0, 0x0, &(0x7f0000000380)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)={0x8}) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) write$P9_RSTATFS(r0, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x16, 0x289dd3cf, 0x0, 0x40, 0x3, 0x2, 0x2, 0x81}}, 0x43) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) clock_gettime(0x0, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35) [ 239.419696] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:11 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) 03:26:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 03:26:11 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 239.522241] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 239.538953] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 239.601763] loop4: p1[EZD] [ 239.634687] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:11 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") [ 239.701664] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 239.713034] Dev loop1: unable to read RDB block 1 [ 239.730402] loop1: unable to read partition table [ 239.745915] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:11 executing program 3: r0 = gettid() semget$private(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) umount2(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pause() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0xd4e) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80, 0x0) memfd_create(0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) tkill(r0, 0x13) [ 239.753190] loop1: partition table beyond EOD, truncated [ 239.776139] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 239.790169] loop5: p1[EZD] 03:26:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) [ 239.804716] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 03:26:12 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:12 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 239.931393] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 239.984444] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 240.010962] loop4: p1[EZD] [ 240.023379] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:12 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") [ 240.131329] Dev loop1: unable to read RDB block 1 [ 240.136255] loop1: unable to read partition table [ 240.170794] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 240.187435] loop1: partition table beyond EOD, truncated [ 240.200569] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 240.205732] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 240.231792] loop5: p1[EZD] [ 240.250778] loop5: p1 size 2047 extends beyond EOD, truncated [ 240.390177] audit: type=1804 audit(1564716372.435:71): pid=12722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir537833909/syzkaller.kigBqY/169/file0/file0" dev="sda1" ino=16960 res=1 [ 240.440898] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 240.457520] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 240.471949] loop4: p1[EZD] [ 240.479014] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc31}], 0x10, 0x9) 03:26:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 03:26:12 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:12 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:12 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") 03:26:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) fcntl$setstatus(r1, 0x4, 0x44800) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000, 0x8000000}]) [ 240.660970] Dev loop1: unable to read RDB block 1 [ 240.666000] loop1: unable to read partition table [ 240.685011] loop1: partition table beyond EOD, truncated 03:26:12 executing program 2: syz_genetlink_get_family_id$tipc2(0x0) setfsgid(0x0) r0 = creat(0x0, 0xffffffffffffffff) write$cgroup_type(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) [ 240.712405] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 240.740671] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:12 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 240.761544] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 240.779712] loop5: p1[EZD] [ 240.797067] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:12 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 240.835201] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 240.861992] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:12 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) [ 240.909015] loop4: p1[EZD] [ 240.918278] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:13 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) [ 240.970966] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 240.993791] Dev loop1: unable to read RDB block 1 [ 240.998797] loop1: unable to read partition table [ 241.006628] print_req_error: 403 callbacks suppressed [ 241.006633] print_req_error: I/O error, dev loop4, sector 1 03:26:13 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") [ 241.031997] print_req_error: I/O error, dev loop4, sector 1 [ 241.037760] buffer_io_error: 400 callbacks suppressed [ 241.037767] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 241.050962] print_req_error: I/O error, dev loop4, sector 5 [ 241.056719] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 241.071886] print_req_error: I/O error, dev loop4, sector 1 [ 241.077646] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 241.085329] print_req_error: I/O error, dev loop4, sector 5 [ 241.091103] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 241.098558] print_req_error: I/O error, dev loop4, sector 1 [ 241.104372] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 241.115663] print_req_error: I/O error, dev loop4, sector 5 [ 241.121516] Buffer I/O error on dev loop4p1, logical block 1, async page read 03:26:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./bus\x00', 0x42) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) quotactl(0x9, &(0x7f00000003c0)='./bus\x00', r1, &(0x7f0000000bc0)="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") r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000580400003801000038010000780200", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/62], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000fec600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8001001000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffe0000001fe8000000000000000000000000000aaffffffffffffffffffffffff00000000000000ff00000000ffffff000000000076657468315f746f5f626f6e64000000687773696d3000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000800000000000000000000000000000000000f0001801000000000000000000000000000000000000000004000000280065756936340000000000000000000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180160010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000228f010000000000280069636d7036000000000000000000000000000000000000000000000000000001600000000000480049444c4554494d45520000000000000000000000000000000000000000000300000073797a3000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000098e91b"], 0x3) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000006c0)=@hopopts={0x5e, 0x4, [], [@generic, @calipso={0x7, 0x18, {0x7, 0x4, 0xfffffffffffff800, 0x1, [0x1000, 0x0]}}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@empty, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0x2b7) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) pipe(0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000140), 0x4) bind(r2, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, 0x0) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r4) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(0x0, 0x141042, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffde9, 0x37, 0x1, {0x2, 0xfffffffffffffff7, 0x1, 0x0, 0xffffffffffffff99, 'vboxnet0['}}, 0x27) ftruncate(r5, 0x80003) sendfile(r2, r5, &(0x7f00000000c0), 0x8000fffffffe) syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:26:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) get_robust_list(0x0, 0x0, &(0x7f0000000380)) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$P9_RSTATFS(r0, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x16, 0x289dd3cf, 0x0, 0x40, 0x3, 0x2, 0x2, 0x81}}, 0x43) setfsgid(r1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) r2 = creat(&(0x7f0000000340)='./file0\x00', 0xffffffffffffffff) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0x76656f) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f0000000600)=[{0x4, 0x3, 0x2, 0xc0a8, @time={0x0, r3+30000000}, {0xc48f, 0x85a}, {0x2, 0x1f}, @raw8={"046d030133f0eb847e15c4ad"}}, {0x99, 0x0, 0x1f, 0x2, @time, {0x100, 0x20}, {0x0, 0x9188}, @ext={0x5a, &(0x7f0000000200)="dae4ea57ce85aa285a67de7c1af56bc9d48ed8486340fdf6a45a39ed5f4a7aa1a3cffbe1183c7b48862ca992ec260b2cf57e214582d3bc87c4b14928eee8d3bf76b23f7bab66f3200b2965d975fbae44f320dffd178927f93094"}}, {0x0, 0x0, 0x1, 0x0, @tick=0x7fffffff, {0x1f, 0x77ee4122}, {0x9, 0x5}, @quote={{0x1, 0x2}, 0x7, &(0x7f0000000280)={0xfffffffffffffeff, 0x7, 0x80, 0x8, @tick, {0x0, 0x6}, {0x0, 0x4}, @control={0x1c2e, 0x6, 0x2}}}}, {0x0, 0x3fe00000000, 0xffffffff, 0x10001, @time, {0x7f}, {0x8}, @addr={0x0, 0x3}}, {0x6, 0x0, 0x0, 0x0, @tick=0x37, {0x0, 0x101}, {}, @control}, {0x9, 0x0, 0x100000001, 0x8, @time, {0x4, 0x12}, {0x1, 0x8f51}, @queue={0x5, {0x0, 0x80000001}}}, {0x0, 0x48, 0x4, 0x7fffffff, @tick, {0x0, 0x81}, {0xffffffff, 0x927}, @control}], 0x150) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) [ 241.129006] print_req_error: I/O error, dev loop4, sector 1 [ 241.134829] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 241.142675] print_req_error: I/O error, dev loop4, sector 5 [ 241.148449] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 241.162326] loop1: partition table beyond EOD, truncated [ 241.207690] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 241.252132] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 241.277820] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:13 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 241.301952] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 241.336141] loop5: p1[EZD] 03:26:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)={@multicast2, @loopback, 0x0, 0x1, [@broadcast]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000231000)={@multicast2, @loopback, @broadcast}, 0xc) [ 241.354422] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 241.362257] loop5: p1 size 2047 extends beyond EOD, truncated [ 241.417747] loop4: p1[EZD] [ 241.442062] loop4: p1 size 2047 extends beyond EOD, truncated 03:26:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='norgrplvb,noacl,nosuiddir,statfs_quantum=-']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:26:13 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) [ 241.511358] Dev loop1: unable to read RDB block 1 [ 241.516544] loop1: unable to read partition table [ 241.556216] loop1: partition table beyond EOD, truncated [ 241.620401] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 241.652136] gfs2: not a GFS2 filesystem 03:26:13 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) 03:26:13 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) read(r0, 0x0, 0x3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r1, r2) 03:26:13 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 241.741506] gfs2: not a GFS2 filesystem 03:26:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x4000000000001fc, 0x1f00) 03:26:13 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x4003) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 241.890914] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 241.900594] Dev loop1: unable to read RDB block 1 [ 241.905572] loop1: unable to read partition table [ 241.914574] audit: type=1804 audit(1564716373.965:72): pid=12877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/240/file0/file0" dev="loop3" ino=13 res=1 [ 241.937044] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 241.947823] loop1: partition table beyond EOD, truncated [ 241.960915] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 241.980775] loop5: p1[EZD] 03:26:14 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x401) [ 241.987935] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:14 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x11, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 03:26:14 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:14 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETVERSION(r0, 0x80044944, &(0x7f0000000400)) 03:26:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:26:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x20000000000036, 0x11d, 0x0, 0x0, {0x4801}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:26:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000280)) 03:26:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) ioctl$KDADDIO(r0, 0x8910, 0x70e000) 03:26:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fchmod(r0, 0x0) [ 242.241177] Dev loop1: unable to read RDB block 1 [ 242.246296] loop1: unable to read partition table 03:26:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0xb, 0xffffffffffffffff}, 0x14}}, 0x0) 03:26:14 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000440)=""/71, 0x47) 03:26:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/rt6_stats\x00') preadv(r1, &(0x7f00000017c0), 0x333, 0x0) [ 242.285643] loop1: partition table beyond EOD, truncated [ 242.325480] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 242.345054] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 242.386452] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 242.428985] loop5: p1[EZD] [ 242.446181] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:14 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100)="c6ef157d03adc9514c2e41a8bf390239054af9caf1a3f5b0", 0x2c4, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000400)={r2, r1, r2}, &(0x7f0000002700)=""/83, 0xfffffffffffffe43, 0x0) 03:26:14 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:14 executing program 2: 03:26:14 executing program 0: 03:26:14 executing program 3: 03:26:14 executing program 2: 03:26:14 executing program 0: 03:26:14 executing program 3: 03:26:14 executing program 0: 03:26:14 executing program 3: 03:26:14 executing program 2: [ 242.724894] Dev loop1: unable to read RDB block 1 [ 242.731066] loop1: unable to read partition table [ 242.758569] loop1: partition table beyond EOD, truncated [ 242.765657] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 242.789966] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 242.799870] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 242.826064] loop5: p1[EZD] [ 242.837890] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:15 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:15 executing program 4: 03:26:15 executing program 3: 03:26:15 executing program 0: 03:26:15 executing program 2: 03:26:15 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:15 executing program 3: 03:26:15 executing program 2: 03:26:15 executing program 0: 03:26:15 executing program 4: 03:26:15 executing program 3: 03:26:15 executing program 2: [ 243.161748] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 243.205247] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 243.231215] Dev loop1: unable to read RDB block 1 [ 243.236689] loop1: unable to read partition table [ 243.248154] loop5: p1[EZD] [ 243.273392] loop1: partition table beyond EOD, truncated [ 243.279407] loop5: p1 size 2047 extends beyond EOD, truncated [ 243.284452] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:26:15 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:15 executing program 3: 03:26:15 executing program 0: 03:26:15 executing program 4: 03:26:15 executing program 2: 03:26:15 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:15 executing program 4: 03:26:15 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 03:26:15 executing program 3: 03:26:15 executing program 0: 03:26:15 executing program 4: 03:26:15 executing program 3: [ 243.493210] Dev loop1: unable to read RDB block 1 [ 243.498194] loop1: unable to read partition table [ 243.543307] loop1: partition table beyond EOD, truncated [ 243.571380] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 243.577254] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 243.588634] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 243.608861] loop5: p1[EZD] [ 243.619742] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:15 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:15 executing program 2: 03:26:15 executing program 0: 03:26:15 executing program 3: 03:26:15 executing program 4: 03:26:15 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:15 executing program 3: 03:26:15 executing program 4: 03:26:15 executing program 2: 03:26:15 executing program 3: 03:26:15 executing program 0: 03:26:15 executing program 4: [ 243.831280] Dev loop1: unable to read RDB block 1 [ 243.845311] loop1: unable to read partition table [ 243.877105] loop1: partition table beyond EOD, truncated [ 243.915614] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 243.965370] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 243.979318] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 244.004512] loop5: p1[EZD] [ 244.008889] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:16 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:16 executing program 2: 03:26:16 executing program 3: 03:26:16 executing program 0: 03:26:16 executing program 4: 03:26:16 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:16 executing program 4: 03:26:16 executing program 2: 03:26:16 executing program 3: 03:26:16 executing program 0: 03:26:16 executing program 4: 03:26:16 executing program 2: [ 244.309213] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 244.332963] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 244.344485] loop5: p1[EZD] [ 244.348090] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:16 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:16 executing program 2: 03:26:16 executing program 3: 03:26:16 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:16 executing program 0: 03:26:16 executing program 4: 03:26:16 executing program 2: 03:26:16 executing program 3: 03:26:16 executing program 0: 03:26:16 executing program 4: 03:26:16 executing program 2: 03:26:16 executing program 3: 03:26:16 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") 03:26:16 executing program 0: 03:26:16 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:16 executing program 4: 03:26:16 executing program 3: 03:26:16 executing program 2: [ 244.733257] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 244.743692] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 244.749746] loop5: p1[EZD] [ 244.753647] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:16 executing program 4: 03:26:16 executing program 3: 03:26:16 executing program 2: 03:26:16 executing program 0: 03:26:17 executing program 4: 03:26:17 executing program 0: [ 245.095442] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 245.105379] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 245.112083] loop5: p1[EZD] [ 245.115432] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:17 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") 03:26:17 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000001618321efd14cb411c1f2b4e644a27fd40100000677c00000000861a6c040004009d7dd072ac206db44a4a382302cc960b0004ed33ab"], 0x1}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:26:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendfile(r1, r0, 0x0, 0x10013c93e) 03:26:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) 03:26:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:26:17 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:26:17 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) [ 245.221653] ptrace attach of "/root/syz-executor.2"[13247] was attempted by "/root/syz-executor.2"[13249] 03:26:17 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:17 executing program 0 (fault-call:5 fault-nth:0): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 245.410649] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 245.444111] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:17 executing program 3: r0 = socket(0x840000000015, 0x3, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000000)) [ 245.473901] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 245.497091] loop1: p1[EZD] [ 245.502772] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 245.508845] FAULT_INJECTION: forcing a failure. [ 245.508845] name failslab, interval 1, probability 0, space 0, times 0 [ 245.542991] loop5: p1[EZD] [ 245.559166] loop5: p1 size 2047 extends beyond EOD, truncated [ 245.569964] CPU: 1 PID: 13284 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 245.577113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.586542] Call Trace: [ 245.589173] dump_stack+0x138/0x19c [ 245.592814] should_fail.cold+0x10f/0x159 [ 245.596956] should_failslab+0xdb/0x130 [ 245.600923] __kmalloc+0x2f0/0x7a0 [ 245.604448] ? __sb_end_write+0xc1/0x100 [ 245.608493] ? strnlen_user+0x12f/0x1a0 [ 245.612449] ? SyS_memfd_create+0xba/0x3a0 [ 245.616666] SyS_memfd_create+0xba/0x3a0 [ 245.620726] ? shmem_fcntl+0x130/0x130 [ 245.624614] ? do_syscall_64+0x53/0x640 [ 245.628571] ? shmem_fcntl+0x130/0x130 [ 245.632439] do_syscall_64+0x1e8/0x640 [ 245.636306] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:26:17 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) [ 245.641131] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.646341] RIP: 0033:0x459829 [ 245.649510] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.657202] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 245.664451] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 245.671726] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 245.678975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4 [ 245.686248] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 03:26:17 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") 03:26:17 executing program 3: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:26:17 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:17 executing program 0 (fault-call:5 fault-nth:1): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 245.760834] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 245.783604] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:17 executing program 2: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) [ 245.816061] loop4: p1[EZD] [ 245.833101] loop4: p1 size 2047 extends beyond EOD, truncated [ 245.894882] FAULT_INJECTION: forcing a failure. [ 245.894882] name failslab, interval 1, probability 0, space 0, times 0 [ 245.947881] CPU: 1 PID: 13311 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 245.955048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.964412] Call Trace: [ 245.967009] dump_stack+0x138/0x19c [ 245.970653] should_fail.cold+0x10f/0x159 [ 245.974810] should_failslab+0xdb/0x130 [ 245.978781] kmem_cache_alloc+0x2d7/0x780 [ 245.982917] ? __alloc_fd+0x1d4/0x4a0 [ 245.986703] __d_alloc+0x2d/0x9f0 [ 245.990145] ? lock_downgrade+0x6e0/0x6e0 [ 245.994288] d_alloc_pseudo+0x1e/0x30 [ 245.998071] __shmem_file_setup.part.0+0xd8/0x400 [ 246.002900] ? __alloc_fd+0x1d4/0x4a0 [ 246.006687] ? shmem_fill_super+0x8c0/0x8c0 [ 246.011004] SyS_memfd_create+0x1f9/0x3a0 [ 246.015155] ? shmem_fcntl+0x130/0x130 [ 246.019033] ? do_syscall_64+0x53/0x640 [ 246.023000] ? shmem_fcntl+0x130/0x130 [ 246.026878] do_syscall_64+0x1e8/0x640 [ 246.030779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.035632] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.040809] RIP: 0033:0x459829 [ 246.043990] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.051694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 246.058968] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 246.066238] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 246.073508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4 [ 246.080775] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000005 03:26:18 executing program 0 (fault-call:5 fault-nth:2): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:18 executing program 3: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 246.150889] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 246.151354] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 246.163667] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 246.182115] loop5: p1[EZD] [ 246.185914] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:18 executing program 4: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:26:18 executing program 2: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 246.206410] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 246.212855] FAULT_INJECTION: forcing a failure. [ 246.212855] name failslab, interval 1, probability 0, space 0, times 0 [ 246.251456] CPU: 1 PID: 13323 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 246.254220] loop1: p1[EZD] [ 246.258603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.258609] Call Trace: [ 246.258628] dump_stack+0x138/0x19c [ 246.258647] should_fail.cold+0x10f/0x159 [ 246.258665] should_failslab+0xdb/0x130 [ 246.258680] kmem_cache_alloc+0x2d7/0x780 [ 246.277195] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 246.277211] ? rcu_read_lock_sched_held+0x110/0x130 [ 246.277227] ? shmem_destroy_callback+0xa0/0xa0 [ 246.277239] shmem_alloc_inode+0x1c/0x50 [ 246.277249] alloc_inode+0x64/0x180 [ 246.312277] new_inode_pseudo+0x19/0xf0 [ 246.316260] new_inode+0x1f/0x40 [ 246.319627] shmem_get_inode+0x75/0x750 [ 246.319643] __shmem_file_setup.part.0+0x111/0x400 [ 246.319654] ? __alloc_fd+0x1d4/0x4a0 [ 246.319664] ? shmem_fill_super+0x8c0/0x8c0 [ 246.319680] SyS_memfd_create+0x1f9/0x3a0 [ 246.319690] ? shmem_fcntl+0x130/0x130 [ 246.344683] ? do_syscall_64+0x53/0x640 [ 246.348667] ? shmem_fcntl+0x130/0x130 [ 246.352564] do_syscall_64+0x1e8/0x640 [ 246.356454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.361312] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.366502] RIP: 0033:0x459829 [ 246.369686] RSP: 002b:00007f86267ef9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.377398] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 246.384659] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 246.384666] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845 03:26:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) dup2(r1, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) 03:26:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0xb7, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6307048e4887d5b2"], 0x0) 03:26:18 executing program 0 (fault-call:5 fault-nth:3): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 246.384672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 246.384678] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004 [ 246.433746] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 246.461290] print_req_error: I/O error, dev loop5, sector 1 [ 246.467159] print_req_error: I/O error, dev loop5, sector 1 [ 246.473079] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 246.486196] print_req_error: I/O error, dev loop5, sector 5 [ 246.492124] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 246.499682] print_req_error: I/O error, dev loop5, sector 1 [ 246.506097] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 246.513495] print_req_error: I/O error, dev loop5, sector 5 [ 246.519216] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 246.530353] print_req_error: I/O error, dev loop5, sector 1 [ 246.536098] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 246.536203] print_req_error: I/O error, dev loop5, sector 5 [ 246.549141] Buffer I/O error on dev loop5p1, logical block 1, async page read 03:26:18 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") 03:26:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000005010040000000003eb4803268e212d54de21b0000000000000000eb00"/48]) [ 246.560211] print_req_error: I/O error, dev loop5, sector 1 [ 246.566144] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 246.573535] print_req_error: I/O error, dev loop5, sector 5 [ 246.579285] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 246.586071] FAULT_INJECTION: forcing a failure. [ 246.586071] name failslab, interval 1, probability 0, space 0, times 0 [ 246.586878] print_req_error: I/O error, dev loop5, sector 1 [ 246.604369] Buffer I/O error on dev loop5p1, logical block 0, async page read 03:26:18 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xea7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 246.611981] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 246.660903] CPU: 0 PID: 13349 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 246.668057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.677398] Call Trace: [ 246.677420] dump_stack+0x138/0x19c [ 246.677439] should_fail.cold+0x10f/0x159 [ 246.677457] should_failslab+0xdb/0x130 [ 246.677475] kmem_cache_alloc+0x2d7/0x780 [ 246.677490] ? shmem_alloc_inode+0x1c/0x50 [ 246.683783] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 246.683802] selinux_inode_alloc_security+0xb6/0x2a0 [ 246.691895] security_inode_alloc+0x94/0xd0 [ 246.691911] inode_init_always+0x552/0xaf0 [ 246.691923] alloc_inode+0x81/0x180 [ 246.691933] new_inode_pseudo+0x19/0xf0 [ 246.691943] new_inode+0x1f/0x40 [ 246.691956] shmem_get_inode+0x75/0x750 [ 246.691968] __shmem_file_setup.part.0+0x111/0x400 [ 246.691977] ? __alloc_fd+0x1d4/0x4a0 [ 246.691985] ? shmem_fill_super+0x8c0/0x8c0 [ 246.692001] SyS_memfd_create+0x1f9/0x3a0 [ 246.692012] ? shmem_fcntl+0x130/0x130 [ 246.705846] ? do_syscall_64+0x53/0x640 [ 246.705860] ? shmem_fcntl+0x130/0x130 [ 246.705873] do_syscall_64+0x1e8/0x640 [ 246.705882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.705900] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.705907] RIP: 0033:0x459829 [ 246.705916] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 [ 246.755556] ORIG_RAX: 000000000000013f [ 246.755564] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 246.755571] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 03:26:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005ec0)=[{0x0}, {&(0x7f0000003ac0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) mbind(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0xc003, &(0x7f0000000000)=0x4, 0x80, 0x1) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 246.755577] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 246.755583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4 [ 246.755589] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 03:26:18 executing program 0 (fault-call:5 fault-nth:4): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 246.861055] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 246.861064] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 246.878289] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 246.904115] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 246.917319] loop1: p1[EZD] [ 246.924347] FAULT_INJECTION: forcing a failure. [ 246.924347] name failslab, interval 1, probability 0, space 0, times 0 [ 246.939971] CPU: 0 PID: 13375 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 246.944128] loop5: p1[EZD] [ 246.947099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.947105] Call Trace: [ 246.947124] dump_stack+0x138/0x19c [ 246.947143] should_fail.cold+0x10f/0x159 [ 246.947160] should_failslab+0xdb/0x130 [ 246.947172] kmem_cache_alloc+0x2d7/0x780 [ 246.947189] ? lock_downgrade+0x6e0/0x6e0 [ 246.965672] get_empty_filp+0x8c/0x3f0 [ 246.965686] alloc_file+0x23/0x440 [ 246.965702] __shmem_file_setup.part.0+0x1b1/0x400 [ 246.965713] ? __alloc_fd+0x1d4/0x4a0 [ 246.965724] ? shmem_fill_super+0x8c0/0x8c0 [ 246.965741] SyS_memfd_create+0x1f9/0x3a0 [ 246.977980] ? shmem_fcntl+0x130/0x130 [ 246.977992] ? do_syscall_64+0x53/0x640 [ 246.978002] ? shmem_fcntl+0x130/0x130 [ 246.978015] do_syscall_64+0x1e8/0x640 [ 246.978024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.978039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.978049] RIP: 0033:0x459829 [ 246.989571] RSP: 002b:00007f86267ef9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.989583] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 246.989590] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 246.989596] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845 03:26:19 executing program 3: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:26:19 executing program 0 (fault-call:5 fault-nth:5): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 246.989602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4 [ 246.989608] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004 [ 247.021395] loop5: p1 size 2047 extends beyond EOD, [ 247.027996] truncated 03:26:19 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 247.201974] FAULT_INJECTION: forcing a failure. [ 247.201974] name failslab, interval 1, probability 0, space 0, times 0 [ 247.217722] CPU: 0 PID: 13388 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 247.224948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.234308] Call Trace: [ 247.236901] dump_stack+0x138/0x19c [ 247.240532] should_fail.cold+0x10f/0x159 [ 247.244687] should_failslab+0xdb/0x130 [ 247.248669] kmem_cache_alloc+0x2d7/0x780 [ 247.252814] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 247.258258] ? check_preemption_disabled+0x3c/0x250 [ 247.263267] selinux_file_alloc_security+0xb4/0x190 [ 247.268360] security_file_alloc+0x6d/0xa0 [ 247.272588] get_empty_filp+0x162/0x3f0 [ 247.276549] alloc_file+0x23/0x440 [ 247.280074] __shmem_file_setup.part.0+0x1b1/0x400 [ 247.284997] ? __alloc_fd+0x1d4/0x4a0 [ 247.288778] ? shmem_fill_super+0x8c0/0x8c0 [ 247.293189] SyS_memfd_create+0x1f9/0x3a0 [ 247.297321] ? shmem_fcntl+0x130/0x130 [ 247.301192] ? do_syscall_64+0x53/0x640 [ 247.305147] ? shmem_fcntl+0x130/0x130 [ 247.309018] do_syscall_64+0x1e8/0x640 [ 247.312885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.317712] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.322882] RIP: 0033:0x459829 [ 247.326051] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.333745] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 247.340995] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 03:26:19 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") [ 247.348282] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 247.355540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4 [ 247.362791] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 03:26:19 executing program 2: clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r0, 0x0, 0x1, 0xffffffff80000000, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000300)={@hyper}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="000000e473016beb970478f4f1555792c962fa000000c0472c968f707d0100e3e11d3aed7647d738b83e7a39bce379c2e052058ddf266dc9355f12816817e1e1cdb1e52328131d086b72dba0168800b8eeac174e3c32177a8164ca"], 0x7) r1 = getpid() ioctl$RTC_UIE_ON(r0, 0x7003) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) r2 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000340)="ab6d55a756") ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000280)={0x0}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffe00, 0x2) execveat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000140)='/dev/rtc#\x00', &(0x7f0000000180)='vmnet1proc\x00', &(0x7f00000001c0)='*em0\x00', &(0x7f0000000200)='/dev/rtc#\x00'], &(0x7f00000002c0), 0x1000) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) getsockname$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000700)={'nr0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000780)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001d40)={0x0, @local}, &(0x7f0000001d80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001dc0)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000001e00)={@initdev, 0x0}, &(0x7f0000001e40)=0x14) getsockname$packet(r0, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) accept$packet(r3, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002440)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x10, &(0x7f0000002480)={@mcast2, 0x0}, &(0x7f0000000740)=0xffffffffffffff3e) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000069c0)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000006ac0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000007100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000070c0)={&(0x7f0000006b00)={0x598, r4, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r6}, {0x4}}, {{0x8, 0x1, r7}, {0x12c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x952}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xc4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r9}, {0x200, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x6, 0x2, 0xfffffffffffffffd, 0x3}, {0x4, 0x6, 0x9, 0x9}, {0x20, 0x9, 0xa17, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r11}, {0x128, 0x2, [{0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}]}, 0x598}, 0x1, 0x0, 0x0, 0x1}, 0xc000) [ 247.447743] input: syz0 as /devices/virtual/input/input8 03:26:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x11fffffffe) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x541) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x40001) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0xb, {0x0, 0x8, 0x8000, 0x6}}) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000001c0)={0x4, "1d9c9a5a1c24d36532900080e7a5ecb61779831d911ae4b9553efef8a64aa1cd", 0x811, 0x7, 0x7f, 0x6, 0x2}) [ 247.509032] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 247.536407] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:19 executing program 2: timer_create(0x2, 0x0, &(0x7f00000015c0)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) r0 = syz_open_dev$dspn(&(0x7f0000001000)='/dev/dsp#\x00', 0x5, 0x208a01) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001040)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x7ff, 0x1ff}, &(0x7f0000001100)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000001140)=r1, 0x4) 03:26:19 executing program 0 (fault-call:5 fault-nth:6): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 247.560513] loop1: p1[EZD] 03:26:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @initdev}, 0x10) listen(r0, 0x100000000009) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x6c, &(0x7f0000000180), &(0x7f0000000000)=0x8) 03:26:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='map_files\x00') getdents(r0, &(0x7f0000000300)=""/4096, 0x18) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000040)={0xfffffffffffffff8, 0x100000001, 0x2, 0xfffffffffffffffa, 0x1, 0x800}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x100, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000080)='map_files\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r2, &(0x7f0000000100)='net/route\x00') [ 247.613551] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 247.636410] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 247.653504] loop5: p1[EZD] 03:26:19 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 247.659310] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:19 executing program 2: syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="96116d4d071b9903e62dd364ff0cbc30b2b87e35f7588574b19fed3fcc2956dd8abfa76498743cccc17727eb4df103a0c3bbdef34520b16485e6b1911930da17a5066229422ba571ee964441ef3c3b22be4423bcd10e06943ee13cd78cb6de7bbfda2d3aeced7717ed05bf7771f777719a4e493b03dbf9012f44545b6d65d9591e7162cca14634b5cb1da12a8cd7874e7d968c9c1d5b6f01527f79244bed41180e", 0xa1, 0xa1b}, {&(0x7f0000000240)="ba7a78f588a0f2791ae81d577916aa2c60ec14d4408762f2b74dc3743809a947be63c81672b851ae4f8d373b29b17fcd7b43004651b775c316ed1a19e6c18e73ee33674b75621e8d5f40bec83921e1defa5a74b0767635840660f013d33a10656613c2da921c286cf7d25e382243df6def49c1dc149491567346a596cb4128af381e1823fba883c7233d8efd86c421ac3f66d5f3f67fe0d5313b125b7124e85befadb37f041f31fb2118f9992bcb33ebb89c6004006c03d976", 0xb9, 0x80000001}, {&(0x7f0000000300)="4340786e329d9ddc7311df038f19de18ed96f6b0ac65b8a88316a690d80b9f7deef5026210ec183745cb394e00c8e237bd39a31235c395f9295a883a14ca84f6ea4c0039986d412f99fdaafc56", 0x4d, 0x7f7}], 0x11001, &(0x7f00000001c0)='vboxnet1}md5sum\xda\\-\':mime_type\xfc/\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x1, 0x0, 0x79c4}) close(r0) r1 = open(&(0x7f0000000400)='./file0\x00', 0x20000, 0x40) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000540)) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000480)=0xb16, 0x4) [ 247.699209] FAULT_INJECTION: forcing a failure. [ 247.699209] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.718407] CPU: 0 PID: 13427 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 247.725571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.725585] Call Trace: [ 247.725601] dump_stack+0x138/0x19c [ 247.725620] should_fail.cold+0x10f/0x159 [ 247.725631] ? __might_sleep+0x93/0xb0 [ 247.725647] __alloc_pages_nodemask+0x1d6/0x7a0 [ 247.737588] ? __alloc_pages_slowpath+0x2930/0x2930 [ 247.745319] ? lock_downgrade+0x6e0/0x6e0 [ 247.745337] alloc_pages_vma+0xc9/0x4c0 [ 247.745353] shmem_alloc_page+0xf6/0x1a0 [ 247.753864] ? shmem_swapin+0x1a0/0x1a0 [ 247.753877] ? cred_has_capability+0x142/0x290 [ 247.753888] ? check_preemption_disabled+0x3c/0x250 [ 247.753901] ? __this_cpu_preempt_check+0x1d/0x30 [ 247.763046] ? percpu_counter_add_batch+0x112/0x160 [ 247.794452] ? __vm_enough_memory+0x26a/0x490 [ 247.798959] shmem_alloc_and_acct_page+0x12a/0x680 [ 247.803894] shmem_getpage_gfp+0x3e7/0x25d0 [ 247.808212] ? shmem_add_to_page_cache+0x860/0x860 [ 247.813134] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 247.818320] shmem_write_begin+0xfd/0x1b0 [ 247.822457] ? trace_hardirqs_on_caller+0x400/0x590 [ 247.827460] generic_perform_write+0x1f8/0x480 [ 247.832033] ? page_endio+0x530/0x530 [ 247.835814] ? current_time+0xb0/0xb0 [ 247.839599] ? generic_file_write_iter+0x9a/0x660 [ 247.844426] __generic_file_write_iter+0x239/0x5b0 [ 247.849344] generic_file_write_iter+0x303/0x660 [ 247.854090] __vfs_write+0x4a7/0x6b0 [ 247.857785] ? selinux_file_open+0x420/0x420 [ 247.862175] ? kernel_read+0x120/0x120 [ 247.866045] ? check_preemption_disabled+0x3c/0x250 [ 247.871047] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 247.876482] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 247.881217] ? __sb_start_write+0x153/0x2f0 [ 247.885523] vfs_write+0x198/0x500 [ 247.889048] SyS_pwrite64+0x115/0x140 [ 247.892831] ? SyS_pread64+0x140/0x140 [ 247.896701] ? do_syscall_64+0x53/0x640 [ 247.900658] ? SyS_pread64+0x140/0x140 [ 247.904528] do_syscall_64+0x1e8/0x640 [ 247.908396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.913224] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.918396] RIP: 0033:0x413777 [ 247.921567] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 247.929607] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 247.936862] RDX: 0000000000000040 RSI: 0000000020000080 RDI: 0000000000000007 03:26:20 executing program 3: r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4) sendfile(r0, r0, 0x0, 0xfec) getpgid(0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1}) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:26:20 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0) clock_nanosleep(0x5, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x4020000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0x1, 0x7, 0x2000}, 0x4) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0), 0x4) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140)) open$dir(0x0, 0x0, 0x0) ustat(0x5, &(0x7f0000000000)) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) [ 247.944134] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 247.951423] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000007 [ 247.958675] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006 03:26:20 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") [ 248.061567] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 248.086649] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 248.093398] loop1: p1[EZD] 03:26:20 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:20 executing program 0 (fault-call:5 fault-nth:7): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 248.200842] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 248.216815] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 248.223024] loop5: p1[EZD] [ 248.226785] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:20 executing program 5 (fault-call:3 fault-nth:0): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 248.353144] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 248.396589] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 248.409237] loop1: p1[EZD] [ 248.413358] FAULT_INJECTION: forcing a failure. [ 248.413358] name failslab, interval 1, probability 0, space 0, times 0 [ 248.421773] FAULT_INJECTION: forcing a failure. [ 248.421773] name failslab, interval 1, probability 0, space 0, times 0 [ 248.436046] CPU: 1 PID: 13475 Comm: syz-executor.5 Not tainted 4.14.135 #31 03:26:20 executing program 4: r0 = socket(0x20000000000000a, 0x3, 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'ip6gre0\x00', 0x3}) getsockopt$sock_buf(r0, 0x1, 0x30, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x50010204}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x12, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40804}, 0x200000c0) accept$ax25(r0, &(0x7f0000000080)={{0x3, @netrom}, [@null, @rose, @bcast, @netrom, @null, @bcast, @null, @bcast]}, &(0x7f0000000100)=0xffffffffffffffbc) [ 248.443157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.452515] Call Trace: [ 248.455113] dump_stack+0x138/0x19c [ 248.458749] should_fail.cold+0x10f/0x159 [ 248.462906] should_failslab+0xdb/0x130 [ 248.466885] __kmalloc+0x2f0/0x7a0 [ 248.470432] ? __sb_end_write+0xc1/0x100 [ 248.474489] ? strnlen_user+0x12f/0x1a0 [ 248.478451] ? SyS_memfd_create+0xba/0x3a0 [ 248.482688] SyS_memfd_create+0xba/0x3a0 [ 248.486750] ? shmem_fcntl+0x130/0x130 [ 248.490638] ? do_syscall_64+0x53/0x640 [ 248.494609] ? shmem_fcntl+0x130/0x130 [ 248.498497] do_syscall_64+0x1e8/0x640 [ 248.502383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.507229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.512414] RIP: 0033:0x459829 [ 248.515610] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 248.523317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 248.530587] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 248.537855] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 03:26:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000740)="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", 0x7d8, 0x0, 0x0, 0x0) 03:26:20 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0) clock_nanosleep(0x5, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x4020000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0x1, 0x7, 0x2000}, 0x4) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0), 0x4) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140)) open$dir(0x0, 0x0, 0x0) ustat(0x5, &(0x7f0000000000)) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) [ 248.545125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4 [ 248.552387] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 [ 248.563195] CPU: 0 PID: 13474 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 248.570316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.570321] Call Trace: [ 248.570336] dump_stack+0x138/0x19c [ 248.570353] should_fail.cold+0x10f/0x159 [ 248.570367] should_failslab+0xdb/0x130 [ 248.570379] kmem_cache_alloc+0x2d7/0x780 [ 248.570388] ? vfs_write+0x25f/0x500 [ 248.570402] getname_flags+0xcb/0x580 [ 248.570412] ? check_preemption_disabled+0x3c/0x250 [ 248.570423] getname+0x1a/0x20 [ 248.570432] do_sys_open+0x1e7/0x430 [ 248.570443] ? filp_open+0x70/0x70 [ 248.570451] ? fput+0xd4/0x150 [ 248.570461] ? SyS_pwrite64+0xca/0x140 [ 248.570474] SyS_open+0x2d/0x40 [ 248.570481] ? do_sys_open+0x430/0x430 [ 248.570493] do_syscall_64+0x1e8/0x640 [ 248.570501] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:26:20 executing program 0 (fault-call:5 fault-nth:8): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 248.570515] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.570522] RIP: 0033:0x413711 [ 248.570527] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 248.570537] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000413711 [ 248.570542] RDX: 00007f86267cebaa RSI: 0000000000000002 RDI: 00007f86267ceba0 [ 248.570547] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 248.570552] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 248.570557] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006 03:26:20 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:20 executing program 5 (fault-call:3 fault-nth:1): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 248.806971] FAULT_INJECTION: forcing a failure. [ 248.806971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 248.818808] CPU: 0 PID: 13494 Comm: syz-executor.0 Not tainted 4.14.135 #31 [ 248.825901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.835242] Call Trace: [ 248.837816] dump_stack+0x138/0x19c [ 248.841430] should_fail.cold+0x10f/0x159 [ 248.845563] __alloc_pages_nodemask+0x1d6/0x7a0 [ 248.850234] ? fs_reclaim_acquire+0x20/0x20 [ 248.854540] ? __alloc_pages_slowpath+0x2930/0x2930 [ 248.859543] cache_grow_begin+0x80/0x400 [ 248.863585] kmem_cache_alloc+0x6a6/0x780 [ 248.867714] ? vfs_write+0x25f/0x500 [ 248.871411] getname_flags+0xcb/0x580 [ 248.875191] ? check_preemption_disabled+0x3c/0x250 [ 248.880189] getname+0x1a/0x20 [ 248.883359] do_sys_open+0x1e7/0x430 [ 248.887059] ? filp_open+0x70/0x70 [ 248.890580] ? fput+0xd4/0x150 [ 248.893755] ? SyS_pwrite64+0xca/0x140 [ 248.897626] SyS_open+0x2d/0x40 [ 248.900888] ? do_sys_open+0x430/0x430 [ 248.904758] do_syscall_64+0x1e8/0x640 [ 248.908624] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.913449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.918615] RIP: 0033:0x413711 [ 248.921786] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 248.929478] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000413711 [ 248.936729] RDX: 00007f86267cebaa RSI: 0000000000000002 RDI: 00007f86267ceba0 [ 248.943980] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 248.951230] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 248.958482] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006 [ 248.971517] FAULT_INJECTION: forcing a failure. [ 248.971517] name failslab, interval 1, probability 0, space 0, times 0 [ 248.983517] CPU: 1 PID: 13499 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 248.990627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.999979] Call Trace: [ 249.002568] dump_stack+0x138/0x19c [ 249.006196] should_fail.cold+0x10f/0x159 [ 249.010338] should_failslab+0xdb/0x130 [ 249.010352] kmem_cache_alloc+0x2d7/0x780 [ 249.010364] ? __alloc_fd+0x1d4/0x4a0 [ 249.010383] __d_alloc+0x2d/0x9f0 [ 249.025720] ? lock_downgrade+0x6e0/0x6e0 [ 249.029876] d_alloc_pseudo+0x1e/0x30 [ 249.033680] __shmem_file_setup.part.0+0xd8/0x400 [ 249.038521] ? __alloc_fd+0x1d4/0x4a0 [ 249.038537] ? shmem_fill_super+0x8c0/0x8c0 [ 249.038553] SyS_memfd_create+0x1f9/0x3a0 [ 249.046639] ? shmem_fcntl+0x130/0x130 03:26:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="380100001a002100000000000000000000000000000000000000000000000001ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000001000000006c000000ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff01000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003006c7a6a6800000000000000000000000000000000000000000000000000000000c7b7d10000000000000000000000000000000000000000000000000000000000007f9c00000000"], 0x138}}, 0x0) flock(r0, 0x4) 03:26:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x107000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x600, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'eth', 0x3a, 'netdevsim0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44005}, 0x80) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000240)) 03:26:21 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 03:26:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000080000000000000003054fb272e05fdd051b6ae770b84"], 0x10) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) write$P9_RSTATFS(r0, &(0x7f0000000300)={0x43, 0x9, 0x1, {0xfffffffffffffffc, 0x3ff, 0x3ff, 0x4, 0x84, 0x3, 0xfffffffffffffffa, 0xab, 0x7}}, 0x43) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x8a6f, 0x0, 0x10000, 0xcc6e}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000400)={0x0, 0xf1b}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000480)={r5, 0x3f}, 0x8) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000140)={0xd5, r4}) io_setup(0x4, &(0x7f0000000180)=0x0) io_destroy(r6) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, 0x0) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a493", 0x41, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r2, r7}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) [ 249.046650] ? do_syscall_64+0x53/0x640 [ 249.046661] ? shmem_fcntl+0x130/0x130 [ 249.054663] do_syscall_64+0x1e8/0x640 [ 249.054673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.054689] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.063050] RIP: 0033:0x459829 [ 249.063055] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.063066] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 249.063072] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 03:26:21 executing program 5 (fault-call:3 fault-nth:2): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x7fff, 0x70e}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c80, 0xfffffffffffffffe) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x101040) [ 249.063077] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 249.063082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4 [ 249.063087] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 03:26:21 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) [ 249.183086] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 249.218796] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)=""/80) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 03:26:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x2, 0x7, 0x10001, 0x0, 0x5}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x2c, r2, 0x211, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}}, 0x0) [ 249.239063] loop0: p1[EZD] [ 249.257317] loop0: p1 size 2047 extends beyond EOD, truncated [ 249.302909] FAULT_INJECTION: forcing a failure. [ 249.302909] name failslab, interval 1, probability 0, space 0, times 0 [ 249.332720] CPU: 1 PID: 13527 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 249.339870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.339875] Call Trace: [ 249.339893] dump_stack+0x138/0x19c [ 249.339908] should_fail.cold+0x10f/0x159 [ 249.339926] should_failslab+0xdb/0x130 [ 249.363523] kmem_cache_alloc+0x2d7/0x780 [ 249.367779] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 249.373213] ? rcu_read_lock_sched_held+0x110/0x130 [ 249.378209] ? shmem_destroy_callback+0xa0/0xa0 [ 249.382859] shmem_alloc_inode+0x1c/0x50 [ 249.386899] alloc_inode+0x64/0x180 [ 249.390507] new_inode_pseudo+0x19/0xf0 [ 249.394461] new_inode+0x1f/0x40 [ 249.397827] shmem_get_inode+0x75/0x750 [ 249.401782] __shmem_file_setup.part.0+0x111/0x400 [ 249.406692] ? __alloc_fd+0x1d4/0x4a0 [ 249.410472] ? shmem_fill_super+0x8c0/0x8c0 [ 249.414777] SyS_memfd_create+0x1f9/0x3a0 [ 249.418907] ? shmem_fcntl+0x130/0x130 [ 249.422773] ? do_syscall_64+0x53/0x640 [ 249.426726] ? shmem_fcntl+0x130/0x130 [ 249.430598] do_syscall_64+0x1e8/0x640 [ 249.434466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.439386] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.444554] RIP: 0033:0x459829 [ 249.447721] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.455416] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 249.462664] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 249.469911] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845 [ 249.477162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4 [ 249.484413] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004 03:26:21 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = socket$isdn(0x22, 0x3, 0x2) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'eql\x00', 0x3}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081", 0x7}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="006703000f"], 0xfdef) 03:26:21 executing program 2: unshare(0x2000400) r0 = fanotify_init(0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) getgroups(0x1, &(0x7f0000000380)=[0xffffffffffffffff]) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r3, 0x400) fanotify_mark(r0, 0x90, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x101, @local, 0xe94b}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @broadcast}, 0xef}, @in={0x2, 0x4e22, @rand_addr=0x9}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140)={r5, 0xcd02}, &(0x7f0000000180)=0x8) 03:26:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="de0893e38ff82fb7", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f00000005c0)='/dev/dsp#\x00', 0xc55, 0x80) ioctl$EVIOCGREP(r1, 0x4010744d, &(0x7f0000000500)=""/174) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10000, 0x0) 03:26:21 executing program 5 (fault-call:3 fault-nth:3): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:21 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40200, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000740)=""/4096) openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a64", 0x11, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 03:26:21 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x980000, 0x1, 0x0, [], &(0x7f0000000000)={0x98f90a, 0xd408, [], @p_u8=&(0x7f0000000140)}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='\n\x00\x00g\"\xc5)\xb2\xba\xdf\x91\x13/syz0\x00', 0x1ff) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ptrace(0x10, r2) sched_getparam(r2, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8048000}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="0809006d1a833150f6a31411023722b3b12501b50177defd6cd66cc9", @ANYRES16=r3, @ANYBLOB="200027bd7000fedbdf25140000004c0009000800010003000000080002000300000008000100e9020000080002001f0000000800010000000000080001001f00000008000100ff07000008000100090000000800020003000000480001004400020008000400ff00000008000200c9080000080001001b000000080002000400000008000300ff0f000008000300040000000800020003000000080002000001000008000200040004002000070008000100000800000c00040003000000000000000800020004000000700001002c0002000800030006000000080004000100000008000200ffffff7f0800020073ffffff0800010019000000380004001400010002004e22e00000020000000000000000200002000a004e2400000001000000000000000000000000000000016da10000080003000180ffff5c00010044000400200001000a004e2400000009751f9ce8a0c91e0411931007102b9d3c13010000200002000a004e2000000001fe8000000000000000000000000000aa050000001400020008000400000000000800020008000000"], 0x19c}, 0x1, 0x0, 0x0, 0x11}, 0x40000) symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) [ 249.642309] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 249.694457] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 249.702466] FAULT_INJECTION: forcing a failure. [ 249.702466] name failslab, interval 1, probability 0, space 0, times 0 [ 249.731852] loop1: p1[EZD] [ 249.753507] CPU: 0 PID: 13571 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 249.760654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.770011] Call Trace: [ 249.772609] dump_stack+0x138/0x19c [ 249.776251] should_fail.cold+0x10f/0x159 [ 249.780415] should_failslab+0xdb/0x130 [ 249.784400] kmem_cache_alloc+0x2d7/0x780 [ 249.788562] ? shmem_alloc_inode+0x1c/0x50 [ 249.792803] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 249.798259] selinux_inode_alloc_security+0xb6/0x2a0 [ 249.803370] security_inode_alloc+0x94/0xd0 [ 249.807698] inode_init_always+0x552/0xaf0 [ 249.811937] alloc_inode+0x81/0x180 [ 249.815589] new_inode_pseudo+0x19/0xf0 [ 249.819569] new_inode+0x1f/0x40 [ 249.822941] shmem_get_inode+0x75/0x750 [ 249.826924] __shmem_file_setup.part.0+0x111/0x400 [ 249.831840] ? __alloc_fd+0x1d4/0x4a0 [ 249.835622] ? shmem_fill_super+0x8c0/0x8c0 [ 249.839942] SyS_memfd_create+0x1f9/0x3a0 [ 249.844082] ? shmem_fcntl+0x130/0x130 [ 249.847976] ? do_syscall_64+0x53/0x640 [ 249.851933] ? shmem_fcntl+0x130/0x130 [ 249.855813] do_syscall_64+0x1e8/0x640 [ 249.859691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.864538] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.869723] RIP: 0033:0x459829 [ 249.872906] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.880615] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 249.887882] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 249.895152] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 03:26:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0xfffffffffffffffe, &(0x7f0000000240)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@local, @multicast2, r2}, 0xfffffffffffffef0) getsockname$packet(r1, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x7, 0x26, 0x0, 0xffffffffffffffff}) r5 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xdef, 0x0) socketpair(0x45940bba6ad991dc, 0x800, 0xfffffffffffff790, &(0x7f0000000200)) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f00000000c0)=0x564) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x6) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) 03:26:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x50}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x90040, 0x0) ioctl$SIOCRSACCEPT(r1, 0x89e3) [ 249.902413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4 [ 249.909661] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006 [ 249.931049] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 249.940885] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:22 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.dead\x00', &(0x7f0000000140)='/dev/fuse\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f00000001c0)=0x20) setrlimit(0xe, &(0x7f0000000100)={0x0, 0x6}) io_setup(0x90e4, &(0x7f0000003800)=0x0) io_submit(r3, 0x1, &(0x7f0000003ac0)=[&(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 03:26:22 executing program 5 (fault-call:3 fault-nth:4): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 249.980646] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 249.986641] loop0: p1[EZD] [ 250.016271] loop0: p1 size 2047 extends beyond EOD, truncated [ 250.086220] FAULT_INJECTION: forcing a failure. [ 250.086220] name failslab, interval 1, probability 0, space 0, times 0 [ 250.104827] CPU: 1 PID: 13596 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 250.111979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.121337] Call Trace: [ 250.123937] dump_stack+0x138/0x19c [ 250.127572] should_fail.cold+0x10f/0x159 [ 250.131772] should_failslab+0xdb/0x130 [ 250.135754] kmem_cache_alloc+0x2d7/0x780 [ 250.139896] ? lock_downgrade+0x6e0/0x6e0 [ 250.144032] get_empty_filp+0x8c/0x3f0 [ 250.147904] alloc_file+0x23/0x440 [ 250.151428] __shmem_file_setup.part.0+0x1b1/0x400 [ 250.156341] ? __alloc_fd+0x1d4/0x4a0 [ 250.160124] ? shmem_fill_super+0x8c0/0x8c0 [ 250.164432] SyS_memfd_create+0x1f9/0x3a0 [ 250.168560] ? shmem_fcntl+0x130/0x130 [ 250.172445] ? do_syscall_64+0x53/0x640 [ 250.176398] ? shmem_fcntl+0x130/0x130 [ 250.180282] do_syscall_64+0x1e8/0x640 [ 250.184151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.188994] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 250.194164] RIP: 0033:0x459829 [ 250.197352] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.205057] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 250.212310] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 250.219649] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845 [ 250.226904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4 [ 250.235655] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004 [ 250.268807] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:22 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x62, @local, 0x4e22, 0x1, 'sh\x00', 0x20, 0xa3, 0xd}, 0x2c) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:22 executing program 3: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, 0x0) 03:26:22 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = dup3(r0, r0, 0x80000) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x140) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4000, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:26:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/110, 0x6e) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x630}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x3f}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xf0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xa4, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) [ 250.289327] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 250.296630] loop1: p1[EZD] 03:26:22 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:22 executing program 5 (fault-call:3 fault-nth:5): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000242000)=""/2560, 0xc0f}], 0x1) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/112, 0x70}], 0x1) [ 250.561965] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 250.571759] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 250.585833] FAULT_INJECTION: forcing a failure. [ 250.585833] name failslab, interval 1, probability 0, space 0, times 0 03:26:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000000040)=0x8) r4 = dup2(r3, r3) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) r5 = dup2(r1, r3) dup3(r5, r2, 0x0) [ 250.608568] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 250.614728] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 250.630318] CPU: 0 PID: 13635 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 250.637452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.646813] Call Trace: [ 250.649409] dump_stack+0x138/0x19c [ 250.653053] should_fail.cold+0x10f/0x159 [ 250.657213] should_failslab+0xdb/0x130 [ 250.661186] kmem_cache_alloc+0x2d7/0x780 [ 250.661199] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 250.661213] ? check_preemption_disabled+0x3c/0x250 [ 250.661230] selinux_file_alloc_security+0xb4/0x190 [ 250.661243] security_file_alloc+0x6d/0xa0 [ 250.670812] get_empty_filp+0x162/0x3f0 [ 250.670824] alloc_file+0x23/0x440 [ 250.670836] __shmem_file_setup.part.0+0x1b1/0x400 [ 250.670844] ? __alloc_fd+0x1d4/0x4a0 [ 250.670854] ? shmem_fill_super+0x8c0/0x8c0 [ 250.680416] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 250.680862] SyS_memfd_create+0x1f9/0x3a0 [ 250.685287] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 250.689040] ? shmem_fcntl+0x130/0x130 [ 250.689052] ? do_syscall_64+0x53/0x640 [ 250.689063] ? shmem_fcntl+0x130/0x130 [ 250.689075] do_syscall_64+0x1e8/0x640 [ 250.689084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.689100] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 250.689110] RIP: 0033:0x459829 [ 250.696472] loop3: p1[EZD] [ 250.697537] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.697550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 250.697556] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492 [ 250.697563] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845 [ 250.697569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4 [ 250.697575] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004 [ 250.710310] loop0: p1[EZD] [ 250.722001] loop1: p1[EZD] 03:26:22 executing program 4: setreuid(0x0, 0xee00) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x800000000000, 0x0, 0x8000000000000}) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) 03:26:22 executing program 5 (fault-call:3 fault-nth:6): syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 250.816330] loop0: p1 size 2047 extends beyond EOD, truncated 03:26:22 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) read$alg(r0, &(0x7f0000000080)=""/122, 0x7a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'vcan0\x00', {0x2, 0x4e22, @empty}}) ioctl$VT_WAITACTIVE(r0, 0x5607) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x7, 0xffffffffffff8000}) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r1, 0x100, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x10001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x200400c0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000003c0)={0x3, @bcast, r2}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) setsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f0000000400)=0x4, 0x4) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000480)=@get={0x1, &(0x7f0000000440)=""/41, 0x5}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000004c0)={0x5, 0x1, @stop_pts=0xfffffffffffffffb}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x6452) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000580)={&(0x7f0000ffc000/0x1000)=nil, 0x3f, 0x1, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x5}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000005c0)) ioctl(r0, 0x0, &(0x7f0000000600)="ea69ae7af9f727debe34afa1bf4155") setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000640)=@gcm_256={{}, "e1b4a1a363367085", "4a9236e405091a8d9e591f89d99d867a72645010c84a4c515ce595810fb695e8", "d9dd8c33", "53ea33673bcd171d"}, 0x38) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000680)={'bridge_slave_1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) set_thread_area(&(0x7f00000006c0)={0x9, 0x20001000, 0x1000, 0x7, 0xfe, 0xfffffffffffffff7, 0x7, 0x3547, 0x3f, 0x3}) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000700)={0x9, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e23, @broadcast}}}, 0x108) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000840)="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") ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000940)=0x2000) syz_open_dev$dri(&(0x7f0000000980)='/dev/dri/card#\x00', 0x6, 0x0) fsync(r0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000009c0)={0x0, 0x6}) 03:26:22 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:23 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7375626a5f757365723d9b03ee1d215d2c00"]) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40001, 0x4) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006fc0)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000070c0)=0xe8) sendmmsg$inet(r1, &(0x7f0000007200)=[{{&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000000c0)="36575217ec4e9f142458c2a2f2dcafa11aa0aee4b83eca0cab64ab969c367fa9c8ea1590f94ac8c5fc9a932bb1a5a007de9c324ffc28ca9f591645239befa5eb9adbe5256fa43df3ab072c43e0fe16946eff53d7105acdd22f6384f3b55bf56d07b7a08e832063e43354b13c5ed2168217e22fa1d91c9eb20ab6fc7ab16e77642bd39b43ab10de37c85c7360af9ace0283135e4f7ad4717d3d8f23a3a553837c1d7d636bf2c14abd9087ca89375d043cd7dafa3f978fa3c0f89edda0d69af551ea31a72860d97f10f9a2edf426c6353da83125840501f2e8a839c59055ec5f6c7696941c", 0xe4}, {&(0x7f00000001c0)="4108fba34a9c6e913399ca91b08309ea2fdd57d1f56e28d09868fd345f2c6b2401f7a9d5770610eb8452f27a5d5f48c0bf3f83b5f289a0dc27ab8d8f71a04c79bd07f055c2af3110c6351f88db219100c6217f841b1c7ca32657c8aa00e0e76f9ccaf8f16e411f4d2a62d55dd56cb6993c090a54f0771e861d50355a0468f748a101e6d731131cc18c76779117f3fe8140bda521903d6a5cb68d38d9599b27bf068023cdf234ef6703cbfbbf18c6b7f8e166f4da2c384f250f1e", 0xba}, {&(0x7f0000000280)="bde2bdcf2c3aa221541b3209a18b6124f892c464c71bced7b14eac4317fd12a27f4e1cef7c3f8e9001a1dbdb951698301fe90fe1855029c5813a879f766cc1b0968da928b90babd5fa751b87dc2945deac23c10e6896a77c7355ec67685ec2ebefdcc7de23f1ccce73c080932026b3359aa283d9d569d3f1cf9d3515dd89c4c4", 0x80}, {&(0x7f0000000300)="6b121ee28615614cd37a837e3b7ec2ce64bdaaa57bdc596382f4cd69021590a30985b99df67aaef53a179b46782a96ee6a172320a91fbf038381b5ec49240ccbbe95cbad46cc27c0a0bdff1913433204f405ac7c746793c589778c088a61bcc47ddb50d0d235de723b53bf88d58265c6191dc54669e2d9da02dfb0202fbc03aaa3e89238ba2a4ee4940f7192e0da8bb4ed33b12e587c49893ac04119e5455b77f7b978572da9c7d0c426469eecbe1d0026a678b93fff780606ae31594340fe20d83df8b0d8604f3d0bb2d5bb3c85080be6b8dcae51297df139053f9538a0f7e15195321fded97892c342639d5a", 0xed}, {&(0x7f0000000400)="c07d0092a26868116bc5c74f130e19b37d7cc35efab805dbde47020ecac6c2ee96a4d8ae377374cec26a0ea0bb3d3903d76061f442e96d8cfc4c857eec0b00c0816057ae0b1e4a465d374cfb73e34f98e514ec9a27b90a445675fc134b92e4cb0a414abe36e7a94e6b2e4c70ba5fbdef0ce55a6f2ca5775afaa900672a1c6282e6fd5f6ced4fd805c904fdc068bcf20191110f3388892f033dd73c86", 0x9c}], 0x5, &(0x7f0000000540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1d1}}], 0x18}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)}], 0x1}}, {{&(0x7f0000000600)={0x2, 0x4e22, @rand_addr=0x4}, 0x10, &(0x7f0000001900)=[{&(0x7f0000000640)="349dda089598067e5efdffa03a137e248149746aee2e677cd1026e491ffb39df87cc1724e928865f5bc78355781e42d738215bfd026c5b8693c466648ecb645ba86c640ad12d86bba9c154051ca9978218000b9194444344a7815df86ffd1efb38cda589df3440a5524a09b3a55870eaa7a150aea8ad8ffcabecb0ed4cdffe476c6d07dd6798d5d5f55b0f706dc8d2dee3732d2521cb9fde6784eb81", 0x9c}, {&(0x7f0000000700)="296e4fe8de6ac4ef2021e03ac1e251804fde2924d1d398337cc9efac88ef7c2e21adb68ad64b8508f94ec812027cbac06c079f9a55e69b44121d654b76ebffaa5d19b432b853488db385f2c385ab98b113d5805b824fd799512934e37db92edd173162507f49d5", 0x67}, {&(0x7f0000000780)="8cbadcbbc9a84377846ead3d730a41d11d85d4239fd997414690de4cc709695b82229d0623a5ddc71a04d14f370d1a6ecc59633003d3300be950b37a4cf69547d4de4ca9ea425c1420c491b399fd", 0x4e}, {&(0x7f0000000800)="6040c33aaabd2990b94a910d4a4af2d9dba1396d1df638317e7eea2f724b5827054538ad6457a2844fa1d7269ec801ea82e88d43c050dd9f8de6b7e02a991758f86aec0065935be406cf8d8add0aa32fd3ff90afc9e5a632aee2966fa0cd6823ef0588a54016f4b7d85b444866f6e6d78f67c6298005810faacdbfb9120546d446fe0e7d7a41cc5e4da57431e2a14a6960be5a3b989071054f59725e8ce32981060f188f64bb55203e9169f826057f75a59ddd761ee9fc8cd17c24c03035714ef3e4f81d4c8f41d6f05bfc1678d346cfdded9015a16ba9507a18677ccb46409809af835b64598b049db4aa00a242e4d9", 0xf0}, {&(0x7f0000000900)="5330890316cb9228b922f647982eec31708676f9ef295a29b9185c47e0919a54425e2b079dfba879f8891b4c6123fa9c724ca5c3505567a7708fce13db7c7d647b859c78fd82520e32ac318d684f10b3f29e69bd41a95f143d9cd45a6b5d151383827d9367759a13d0ce858b012742fcafaa02b24bbb8e17d615f21772d7945df890e8b845658108d34411e396c4db47c470ec7389ec1265958e07605644b4c7e15b5eb5fa846f71130f492636ebf5d4c16406e05ae4ba1e627fadc46443e96198df43e579f2122a9d75eff42cfe941a0b98cc9f87621d022dba7efd8351709fb889542edb2cd7f7412995389145c9ed3b72ba20db09cd60f5305139031eb447346e3ad9e786ec8c4451cb76c856fc84196b61eb53951468638171820275e9b6dab3fdfb679c66ce34fbe979ccb5b43a2ed9a071977c486f8262e59e6ffe291e414f14bfc822a49eb48bfe9b6d3fad8137ac9085c9b1fd9e04c8f3066cb4f9faf54fb28a82d35cf812887ec5baac214fbd40ab0e4db107a75e1bc15f67a260b01aa5e33331caa5be8a226d1a1cb81042c24f336c08e63ca7a79c46fc667f521e07154d8b0070a3f38f2fa56059c030b42d74b742bcc911f94f1db379fa357ca59ea60a388e3d7a2abe2fe7d1b369cb8ea1aed3fabdd5375a90945cc68393c4bd9a101adb4a5522d61532015244825fed1afa56b37c81a008d9e374ff984f9f0485cbe4c06f357c2becd859d33f133643acf0c45a1879f0e5b249d1411b663472a20268eebdd0bad59898f3bf76e66e070269f5d4ecc2997d460741b957ba45c9db9983f1ebb0e4c53bc9a27da71e8284829bdb185d7dcca541f670d7dec27b00b1c1afa7515cdab6c1fb108c3458e669816c48a2b3dcfc16106ed05f56550063aee848490af52bff3079682282613ed3fcbf6933899871164d583548969a1c8bc85ec830ef5af56f54d92aae4c773245bd71d38f356084e18f648a11bd6ed4b437ab071eb856dde2c8d5a9b4a03c322c4fa15956f41c54503fb1475aa847c6c41e896618603edd0a9fa278f38b5fda892e8783a3c75dbab8641c935797f84a404978b05037ecf3b4182309aaeb8e2461688cab3ea42a53deaa9a9dbd162974ce23efd53d4d2aa38e5ba13dfd40b0803f0a6ea2f051dbd2e79017967711e78527915798d001c3badba6dc40d2fe20a7803c96b95efab911d9f58c03a69b5b66b6f3bd75c29f4a0911f60d6c382eda46956c13ad033c66c43d38327e12021e0ec01d7f68b03f1aaa3112fae79d140b8f2e3d4e5ae0c55365ad611518d721ac808023107f31552e3725a24bf3a288441c543758e492e2ecf9fa3847df96634572289470fb5562925896690d2944bddfbd91f5e2b954d0bffe3bfd8934105601ed4cd133d48a209adadf72accb6312b889891351f66eff9ce585a7e59fde72de7ee29e7c1384146b504ae80a7cec18c8ad77b400bb6c1a48e542d2cb9c03e06833c20873c53a7b1e54120d926b5026e2b7167cf6ea931384853422b768c190046e1b50244aec4574b1e71a9169daf970d5a021e80a1452a2cc93be1bdcd9229e252d4c2056299476e4fdb24e6043b9d19f12a7b8188d3b8f2fbb5ac74f879f624de998d4016bd3f73c5dd62bf2f4f97025112912535473d897f13854b43f5759d46ac7c03f4690a918a0770493bff5a331031cfe28dcae22d3791b1223d1650344cd16e70036eebda2baf548d414ef49aff395dc12ae325fa86904396c809abe436b7a3d2cc44afbbf2eb565acb77295d4e90c3a665e2391b02737a8f562fe2f4451e7dc82e5c9f50c395ed193ec55a5233b53710c48e4984cdfae721b3a5aed7ce422bc1f73c2f72aae187b803d401294836362c9b956d06f93c354ec1497eda6d69fe30f4ad1f08f24d69baaf4206b8d9ca3d4c8114aff2c1604ade901d343b01e18d23842004556e5b7c7c5c86746008eb9f75ffb53e7548f984f0c776c2ea0c2027cf665b8df1e8b5d98c48f3720a258583ac45246a6dfcc746ca203dc7f97b668c1e355182db33ece7827b360ffda1100811f3affa1820d2d7baa2e1b5c5924c091c1c726b733c987884b51acab99b0e0c3eb3c9cb3fadbed735bd632fe09cc72fd8d51c8dc90bb64ecd6808b29ec80bad41df117afa92144cd3ccd63f316f7fa8b6cbc8c5bb752732b4a7da61a847caacc6e65d1c2ef45813d68f732c8ceb7ac4fc76eda3d2fb5edd8b7d81a187e71c7dc11ef33c03228384c8cd73f2d5e66b638edea5331afe23f8eb8ffcd2176ba2896520ee7b775360a76791dd29e4e2c19b658dc7c9a4a1420819a01c981bb651fd33e538be68828b154cba5309b0909017e31da19a7f96221039f335924441cb9ec0f09e93d134142c5595594a53cf27da22709c6f88ef95dde479c74b11fb99e73d635f7e5c17259aa524951852c263157aab3b0e49f355c8ebe6400bb6f01ddd81ffc5756738e91d60feab4f9953185e22ebe34d810d107e0685446580f33dfc652002a60cec90f182b2eda6094b441f91bae9b30502025d88d327194f632f622671ade60d4d36596fdb081ebe89a64aa025c22747ce58e55525740e1bb6394bffdf9ce83a734ee595851965d83f9aff3a05beaf3efe88ee403ff6c13176aa11d96107c0458e78a35f1b62f12735e96ab7b1b03f4f1d4089d62cfc2f6daa29e25ff3d75c97af8873cbbf4ef4665dd213e47014ab695a0a431920bb8c41f6c6bcb3788ab893bbdb70e18372100fbe300c936e1fa7862eadcedb979c12142dfc645b37109f30e92a746e01be025d0378bd7b5d77b4dca78391e72b9905213e61e9052fe9b0573388468052b92a07e717dd33dd7dc75e1d0265666470a5651ed6b4a35746513a5853daae444d3de0e78f5c21b6b2dde9e9c4237cb8b2db571953561331b501e3d7e9cd006a98ecbb9b7c4b7ea8ed2122a5b5bb0e8a95b1a9cc85e4fe79f101d4f6a58e92c84554aad2e612110c6d55f3f0b20c5dae37a83de3ececde5b80a931434b5cbb267f2820b11f60dd9236b3357cc12d5b297d1b48f1e2b05104cdef33972117095959791ae87f26594da7aa57e68d13e15d50c6db72db9322e7bc27ddecded3008d139162ad5a458b68bb95a6b7b4b6f0ee55997ba237a53d71e9870af6c60560b8c18104e5b961f22300c53082f144148aa9c9b8af00bca2b40be03757ccd05c4a255995b1564506b6ca69468943b239c5e4fd7bd375e8ddc2715efb624967fabfaed4649ce8f9354fc6cf30d0264854658f6f297adeccbf71250ee50f74694811d115adba3ece014e4fff0539a0c5a350764fdcc968fe4b442e446a0bb326b9a9ca3f14c21ab8c0e1b7821ee564ac13e72dc657d8cf4b4223b26a4284f244cf3b5430f372037e97b81e85bb4390c43fd23fbe8b502345d27b7834006bc630f853382b94ff3c92e6233c15bd8c7c863c8d57653f44246f05f625d21d96dc2298fac33906667215a8e196eb2666cb2f13075e55081cbf23b69328f1241f6b03c263ef8ccf651cff56edb128a44b70ac326cd83f3b2ec81955c98f9874c8f6bd03637f00278ac2e52cb76f653a41aae5f107c677406c6e19cd816f5e1511fa3545bbd5e4ababd00956fd6a077d9931150f96d1b2f25101443045def7b86b44945a0267dc62a2385a1a273601b678a16b94e11702440fa343edfafea7228d7031186c8a7e26f4969cdbc90b8c516c61198b2a4f3f4deb86ce000732f1da72c002f051150ebdd724f101f4f19c5406a86f0d8216ab5a46d816b04cc9f26d9500a13ec8ceeb49f7ab91febfacaad9c626c4bb9e14e1e82ad43b1cd725011c531b1f4e81e1f2481566457b634c19d2dfa329c0d0a2f11ce3534071399ac82e61b37645822f8f06177d9cc5ed566e7de54cc63d4f7f287eb2156e0424dcf4bfd56289f58bd5e317ba5521570d63d78ef1dce81a543a5a82f32df5dce8df3d520924bb6304993924aab1f97279171615d9d8eb13ab455186e3511d8b308474fe439e91ddc127d6a8bbc2f377411b1f8aa9af692ef3cc208b635edb0e26077d697348fda5ca4abcb3aa54aa0aa8544520764fb9f6fd69f651aced746f4d17f6feaac46bd92a0eb3dc36e4bc0dd6d673c200bb14787fc04e899ca3e4723703e6abc86ff070ee97b4558904e964f04bdf3c0e5ab3f1a518aba4a2f5e6d61d0406a69cecd06e85cd39a402d3951cc46933f6810f2ef67c5839db1760a8692ddd9eaec5146265151196731061eb088fbf461bcf35f3588530baef395d50084e2156da34264529657b1427bb44fb81303a8a713c5b9f175ce115374c195b178cdf816e5b1475d2dd9d40c0f518c6d763c3f5a42d2837b2c159a155e3de688c9b7a3b3580ddab5ef32814b6a3d2a7fb4c5928b07eefd0feb600630570d528bcf6d98fd88166a2dcadf3e3bb4e588b827d9b31bf04593a057c319b1921b4122b6a0679671aab9565cce205a231b63461d94495802fbfd3f2aaed0114dd8b1501ecde8edf06951526e05c22e0b1f6ce0ba838ba5f5d2404d197e0ebc3f8dcf2e453976e6cac3f63207c234fa04b4fc1afe199557317b6680abdc51b152ac0e3ac4fb633a6c693ff801b8b0611000862ad6aca2195472421f47bc06bdd5b371237c2722cdb2c6064cc27608ab28acb4c1fb4e90b1cf0f8d1d34e57633efbe651d2b64146dd9c4baa20f95f393aad9184be6396b2510184e55685deba3414358a00623be26767a37db9e2406fb8d3709455e309e82072571afade2b96c6dc01d6ccc84118fe1308e56cd499181d5aa23c2620ce6871b569810706f886e6d944256461aafd4ad3bfcc3eaeb56635cb1b369b42702c534005cf30bb1e78f8f34f4164e64e42d92eb19da52a8185ccd7c0f2561cfc59388e7fb408e300d7864f8d04e41315923da84ad9cf2c44948618a2d7ab48a8c7e4ac6626608a6274fc8dcfbf1ec7d897f037838f8209619141f9e6deca82b3884461eb0c7f405a04a2b4e47a99b15165fa0547a5008c2015f4e2449c1273a1be2b25e06219d4d3153da871a16913bb9fa7f9d1576790780b661290f3264bea47c7ecbb421679232a409b55faa29bf235777573ea0a681c41da960f3e09bfb847a1ad5b0bf2fa9d3f99163388d28739d42c46b7808065e253420bd793170752c24549b210325de9d06426a5b9b905a23cc3963b4c5ea457c97bffa02b9938675f1a731b729d98401b4a1433a7c2158db5ad30fb54c258cfd51cdb9b4a9dce1f0ec1c90fb043a58d870691f08df93f9cc4eaaf314c620cd6cc25eedb1f728f54d4a696d2505600b76dc64a3ace31a1c20fd29031dbf3529004a6b2b23198636d68b7b01b763a7f0a766edd1ee8bb9911928ed97701eccb634ac69972f022d26ba0b31e0a293ce177f41ec1d528ffb9d20e5a6a9900de4d1473607d7a218302792ea75e61dc152cab9d2637064d42ec8f910e5bdc4b5d918f442a490df3657cbd978c9b976865cad3f9ad01b837008bec83741212172363754fba6452433dcb8256d515288aded7c9215f286dba59685e205e90f3d3098187147df5bb642d4fb8033e587b81c22d5e8bedb189a09dc51adeb6cdf0c554edf808eecab8998adc0dae28044be632fdef86b12ea26812dee70d11cabe6c84eccd9ae1a8ce16beb7a81e8a442038536a83bd957a143f712d8cafa8666310ff0b66ed38d170c600b1ce155fd86f628701cb8907f5f42717e6b64697794db0a0bbf4c75e3fcf64f5a7f25a110e9d7fe4fda2f98a43ae67133874a9490df7c94571860e0cb19", 0x1000}], 0x5}}, {{&(0x7f0000001980)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002f00)=[{&(0x7f00000019c0)="b9a79662aedf3d576bdfd971d05c0dff664c3f2f9684b8bb7a631f91ec397a4b6d2a79cc430a7f495e0d8dbe19ddaaaa23a17a954742bfc0688a2f83c05bb66f95b2a50a67c802b46d33f33f02b93f633a0260d19e30a5c3cbbc7bfc3f06df02f852f88b24275f9de7f2911ecff8360461ccc7c01c9f3cfe21d911f22439b10c4a029f4df84cc4c1541319288c1c96f65912c56d3dae", 0x96}, {&(0x7f0000001a80)="d21c18752771c50e46bb4b5908edcbb23ffbd4595ad67d87ca722b3d8f0a94f26b1016c8942eb8e677b464b3d21cb46e6e854933091f536e5780f972981562e430b694ebdb8a4927cdd09425aff7ccbb9d8e8555310f6680d1b302b5e4dd9fcef4c48478fdb2233a85456ecac845c2b5568c3c351c50c56d4423971a12862effd2ccaa5f5c159e198f39d79fb5506fef26ccb7c0ee66a106795c596fd7d996c89ff9aa11a9d948ca09472426552791089e920725d98bde0180288c27281bcd6e409663a3d6e8075d4be81e95540abdb70d610bdc755dabdb711cb201aa840ddc81c2ada14001f4cc980ee8", 0xeb}, {&(0x7f0000001b80)="73531d7f561757156a32b754f2d6a53941536906a00431b21cd95ffcd4aa6e47231933b177ceb8fc6d46422b4203752ac3b3701b136e6237282a7236513893ddea148057bba06041ee93c9f7f8221601fbadd981706fb4370dc33f742ce03ae7e13b924a427657c704cb0f721298abe6a00895f42fc94d44e7317b581a34c5d5930ea182dc90d809ce049083cb65f239617a45d5ec7ea79abb29d7bbb873241e467b75b5c9a1afb695c3bba023af9e052b9f88cb079d3222eeec9b093bd6032ff1f6a96b134218c2616435b65134bf0933b218b095", 0xd5}, {&(0x7f0000001c80)="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", 0x1000}, {&(0x7f0000002c80)="b1123f9a2af4953c13accd79eff8318d1e14028231abb555a8cef77afe2955d20c8216d846edb25d1d7adeb98bc58fffa8d4ec7f31e0094c03ec9eff14dc9db4b79d6950b647952b1f8ef8bfd2f57dc11fcc44a7b2d82254", 0x58}, {&(0x7f0000002d00)="1738bdd94ba5f2ebd81308a9ebfb5899f1373db8dc8b42721aac088120b8c5b5f2149d0cc9ae59563e64406000", 0x2d}, {&(0x7f0000002d40)="d96c3ca973129bdcf3ce548c2f04962ca47b3dce69d3aa3e5955ff75d7c491fe3cad653b574b25e12c3024f916a18f8fc9f124ceb56fba14d2d0cbd810fbb7ba875ef1b75a5854b71b2162e12b1048215738f4b320531cbdb7749e41fcb5e66f28140e48b6441200d076d3b586a1992d5016a16b0626bb6a7c7a10f29825e14fcebf5d1fd95fa840e88c9854aed757be3aaba844d2af6680dc5b1b2f659b19378158c18fba2716d251289c5d7ba096a7dde80643a70d80257e24efd273323330437f8ae38351a5fa46cac2ae6661f85bc164b6896c9f05a4", 0xd8}, {&(0x7f0000002e40)="7ecc8b0f183eb37e3c0d6856a0806dcf68310997ee908e7294b1d45dbbc0d9d67fbca06cd668a07bd3606d26afe111c3a233b2d6c4f214ab5f2ec49e5384d64b82f5ef1c5f36ca1abff6ca27e43aaecd053317a5abaa4bd408f6cd1fd7dff638e999b918daa7ee964f39c1c4d19a4cb9176dedd35646ed9485bfa6d5f98193c5e9b9d762aec27233fc581c27175ef9b3f30a022627295da04ee513bd857967b66e6ca60c0ba0f9ce94494d1f", 0xac}], 0x8}}, {{&(0x7f0000002f80)={0x2, 0x4e24, @rand_addr=0x7}, 0x10, &(0x7f00000042c0)=[{&(0x7f0000002fc0)="f121e4c227d18460c1a80d8813fbf561f46bfa08e46de2ca6941e93b99874dda1fd18696aa3f13c24dc60e3bf2d18d9286f99ca6a457787a08e39496903f243a5fffc2132e724ab99544a881a187d59bd901279b838916680951498f7f2ee76e1f2d86ace7507a561d713c85c0dceca1e32282a83f6cea453d308afdd6776529a6eec1c1ab9596e7926d7ffa0845065cf99fdab61c3397", 0x97}, {&(0x7f0000003080)="64e9b5fff74257b8018bb097e2e803b19338403984e77858a25f6e0bef44fa5ffe93170235daadba5e43c6adc2829607985b83c8c7d520f4ed50030629ff419dcf035b816d5d6f8bb89b0063d58e98f8990af4e9b59d61cc0ffb36d6fcc5c784030362f2c5", 0x65}, {&(0x7f0000003100)="956e9c864d30b9773a1437f8aa7d791c312ce47e0a7813e1fb2945cb6f94a3f020e0780c82f1132086fb3c6afe2190a5731fc4fb55b42d53edc9a56f4c9d841e1e7ef57217d59ae1423dd679cbbc8f0dd719d2681df3fe68f40e017ee3f1ca3e9c40d304e1d8f7c3795f62d15683cb9acd1c53c4388099c57fbdab3f00db745655b6d982ec7529c1812ff81d4128d70d4fba1d6cfa4c71ff0c849ef869b2dbc62ae9cf5ae61631b1ceba89366cc7ab89c1987a4125557cb585f0f301135a6734f90f35d7ab6b175acd2542f813f97ce16c3507b9c26ee2c4cc36af079f135815e309af3ad143bf3867f7e8952f3b63a2a25d47abaea9968ec6b9e2d3e0ed87fa8627d5ddc492150146c8d5fc3f7efe850768c4e373e1b6791d0f0eb98c6f6633f394dba6f13d756cfe2341a3c52288adf34708a169223ff8334380b5d2b48ffc4c7f2b64f4244877a00dbec1af55373c011d6c347534b75a6120c6f111bdde74cffeeb56c9de9c0bf00709f7e0d75cc44780adb6ce4b1ae1ff12e7afab76545131785c66878647a700718e39d187d511fdf90d52fdf459be57126e1c58a02899207e2c682690901980ae0c749343b40262ae73e6c3f0677a404ee970a48cf43135a9e8f49743c6b93b45cce0a2f67deadd387b201ce89ba158a39ca821bae73ea217ca9da154db62bed57cb66498b332cc003c472f76a923211df6e0d887f3642e53f52a93b25a29c706f267bb58462959f533c421bef213945dcb0ad6ec385dc9ce15876509e94ed5a0d7d68ead635483f69b04a632da45705aa4ae0034ad4049f4aadd2f011bd903282d365333819ff78255282abca94c7a03ff83a8c66fcdaa9ea3b9652facf16e9919706f8ad910a1b37cf6cfdcc0973535d3798c83c87da5bf8d2fa7e16ba0dc3b7ce5d13b1cc771f573b11bb5d93470a6e1dbd756a5f38ff36c252897d59cfb2e8c3ad9e7adffb3f3e74a5b25f88527822cef655e81514235b254bebab3e1daa21f40f47026c24e886e217531084576e685cdbb174dd2a0b6bb689645aa1dd050c0ddd1f9c737f8c084c5ea1253e7e65dcee5683f5fde1c9c5b235e602777deaa5363a78410b5fda9941a7f1067e019bb0805c2238d3f388fcdde303919bf38d756df0353cda592d087d7f548ceb68584a876e9e7c2475d33316d48666a413c58f0d3e964d74f9e909f5987c58fe193e6fc0d23da2d08c7cd5f19ba3fbdef144fff3f02a74c76366f81179b1ba8ca007d52a5dfd6becca57c5a6d334548bfbb76d9989b1431bcc4ad60f652e7da9fe45df14e9a613868479c5a68d6642c7a422f6790300f92a710fc27e159dff137bcc1209df7b85c7dfd9f4ab028f730e88c31790cc7c122c8d2f0ec80a0d89cb2f3c152cbb748c1583baaeff5a7bcd909b7051f575490284accae08b85cf00301303f6c187dfa93e8b52528aa557b2bd496f2d161281d42c18c8f821e13c6db68c6c81bf8f09cb6455fe69d2c5e45c9a225e69babfc3f0e6a78b4b0e9c7cbdb7263d57f7899eb9270bd5d6e282cd1aa8c8b013a0c0f9c198f479a7b60e3f1898c5f3338c95addc805a393ba330ce2ef56e8854db7666a0487fdfa9281d8ad53514ce05ad62b3b0515454bf7e721856a7d6bd853e152432a42c3408101a00e8ab8196025dacc49557ab06f8b8ff76dc1dec7119345811c002feb9cc584247fb0a77d41b310579fdc3d45b4b68c1006d160d0d5329028d0c9fd307a951a8ce98f661e5faa06908f3fc8885f2093620c7978ee70a72407d310334daf5b0bab81f14ab098e0f7adfa84b83e38d33050328cff30bc7a46002bfa47db9d6f83cf4d005356c2e236c0aa6e84f73ee440d9c7a7b50be6080f68175f04cecd07125d668a4089abb457c24a12af20331c472f71e9acc223b2517161228b304122593b80b891e959e7a34c6e7b362ba3bed9c00b696837b297e04d6b93c5ae37ae3a4373c20812f08b10dbf3a93c17cad9c2baf26c8c28a3bf5e29f9e198e6cd23ed30ef3bef02134f3cc8158b8875f4adc9670b50c71109340f3ea399f40b50c91355874e54c4c31fb720af24c8fd4ab67fc4e16ec5f77c81b5b7a31612acc7cb51a8b9d0d1dd237b1166e79d6e798be8c95fd5a84adcf7f8461bc24b0376e855727b3dab5dd6e0bf42853f3c57d0a717326fd7fb33791728110640a194b4651a2d10416949c1515a71fe5ca8f7e6254d977b00368d85d0cfa9f8e2734175e3bf8419757a9a775db1bf58296f9aaebec3afcf36704245a90208e8eb94de5d29ec7937337319eb2f3c304b0549d8b058ec78d466544e84bbbb10c18e3007c5adc1d29f9b73303152aa877c03b1f2ab4c630c7f0c16e8efad9c8850e95d22f1c8b4a08e9564d061a81b5849bc699ef554f650bedb7cc6f03d205fd9e2a4d223f15491bbf197affb49d28fec06a93c87c683d5f544de37da127b8522243721c290cb8f2d1732bba55152acf1bcb85b5ea3aeecd712373baa3105ce55912960aefa8d89d7ea8ec2ab01d2c48f703dfc7301784ddf3c1b736f6a25415e866f27f4952c3cb11f7e78752c277fb1e27de7496bf22a33e1a23a1ff3e18342c759d9727b40da810a6654ed2fd6603937abfba09576219092ee680b1f82b993695dbc490ac96e30c08120da26a0af026ca4d317305a3cabc333a3d665753c5b454c25761fdcbcc6d5b9aa1166f17bbb30132745a9ee9a9946517f163962129edb0880c0b35fc1730a4d9f93a3045ed262987e550d0fe412774127f314f98dba6c479ae018ae31d0776c6520d8e16dce5418d076e1ca159c245ace62922920fa80cc58733600c749b74df02865225779cc614feb9b5386829aa35a5e64af7ca5d2549e298290dedc1201394efa6ecde3e01a9e555cc3f49427b29fcbdf1110682964484c3c14cdd42e90df378e2245f1824e6d72ab15f01d20e475f5f6e2df23c8f429ae14bc9be403b3805e9a05486ae036d3645a459fb02955434ce576f122853b21e4f608f25e3cf0c448ca6107f8cfc12d64603c39462cf3fa380338a6efa4015838325e6a7d140cf4f530d77499043d324bc3b657bcfc623e7ae110ea5e2e71890a042e080f13e1c9dcc8f9bb3c0d75b63e84632ff8e34c924895acec4a6741f6a74286471785912d56304545920344f7f3cc90829725c6f020dbe8a2fbfe5cdd7e37b46ab110558b210c19a624ab7378a5d74280d45fa03c9dc4ee7241d6ee5218a03ce11ce66a04027abdf8380f714af31fd24fb958d9f2776f5947af88b33d8faaee7fe62cd7ade99e6efe171165ec0fd0120a12b3666af1b214446928a310fd3e3a420750dc8ac748a2d39bdb2453cd5c0193ad1b3f5eb163695ad99340e5cdf2e31c8a3feb00451ea906615f82ae235c43e72e7aaf5f2e6e0bbf8d68f7b6c2909dee58c4a568266083ea896d8b4ac42b5d914b204f2ce8d6b3193cf2ddafae8b9e376123514f6e51414a22092a111e8126be9afd7cece85f818c2499cabfc008f294ef790427b9e945ae58ee3a5927017e310a4b296792cc6ca08bde29ba16cf88575751cfd7571257a3d20f25a2876cd14db0038f6bc5841fb8822c2c332c0499b68b21ff33dfa223c0d5da55446028844e595e0e5e19fc0877647fa95163a150a3c626bef9ca58dc279cc859291f5abf8aa440fb393f13bf697ee469d82310985bc25fa38ed0140a8d10cb788fac51c4bcdcabab3aee76c448a6f07a4dd55e3bdda6af558e581f304c3af331964291e678443ddeb7e0562f112fc6a8cfeb382a1816bf59e6ee50b3fc42dbd56961d781ba0e3d3a9a5e083fa6b27e97395f81c64195ffa0adc7ed1e1df972c5420af32b4f61b7669d34e54264cf5d2b0e08267385fa8bc2c5b649667a5ce6c72e1ffd4238c0e2743c2af28f35535a47738b856bfc46173f1e986a4105a5c911747ecd274553ba904ab967fdb5d2439830a6b575e16192cc6c34be3f5cc6f8e26bb78f33919ad7b447c98b8e6d2817d0fc86e76f9cd4eb8b658e5e429a7ba9779c1df424e8c88c16dfd5b3fbd826f9a6d760d3c4719bf9cc1c4659b9e314f15c0eb065906cbb629b4152be864b64fe1d902fe833e1a347afaeb5ac6ffd57173a6d6ca8aef5367fa2ccfdb167e0d5ed30c1403010cda41beac8564e54472394b3b89ffd423ccc7d294b9902941d25e5ecd3a79c1a890beac801e201dcdb82d6d165966115745cd45d52103047f8b13a589334ee10b68e4db7acbcdeeba4c4520b4e6b4c0ea2ffaaebf034c208f4e3539c89bfbdeb9bfd654b9a9daedc18a2dea50b9ee816b71c954328f54c837ef88278c0ff1d058868a409fe9bfbb11fbffc55b7b1cd7410dfde7fb4cbb64a64f690b7a374aa23230b9eff6e300f3ae75c6270f7fe041979e7fe531e32faffcd79a4648d6ba64b7c3998646df12c56cde84b9b2d44322175742a6591a065123c0f40258813491c1b8eba967be3767f5c25b9427db8b4378d3fb2a5c8abbd24d47d00689d0fbc4b741bf4796d25dad904a82e16501c00bbb40d9f542adb15b7d32b8c6dd6c83859059c6f0bfa5fa38fa5e89d7598246c58f734b725b678a74a82cbfc23a6c3d13fbb23b262b571417c81ebe3d09a241b6654f36d049702ecf01a6b6d21f686966525615990d941e7bf4bd0b8bdfd614077f9d938ffaaa3dc548e963918048c652aabb7bd420a15136a7df1bec483b32b6c6640cf423ee3de5f817cea0b5dde25536f9ba1a435fd3131a64abdbfd7a1b6e3e3057fdb2a60c0448e41a3d5fc7c69005f91271dec887300a4968b19e35a92eb9e36c9e31dd4eee22811817c42e3b914830840979a4fe0c2d834f2acdd1847dbb6f342025f0772e4a773f6b5c96527500b78cb173326ed589f7ef49c859233a4140031d34e2020b3fffd4f057723e07156aed9bc9a8395f9ccc5889b1e3c59a4146737b05eb9e6eef3a3062ea581574efc3ee465db63e8a4a199066a904e71c6753ac57f5f67d821526f1ca411ca35e80b6fdd355ae6573313af1f25c1f4c9d231a28ba52adbd605e430bc8c65997cca83e4a139e2ac80b7d665689eae65a1d98780140f533b5d0b1bb84951f871c3e1fbb4f87bfe1dcf8224d3883977a9ecc752198692d8f8062614fae6477e948c51e049511a78d83cd9e76de6af74e593211df5d54f12380cf2f9260f4b1800601b544340c87f18860ea12566382d0f58c9f46187f562509944b869eb9620873b6ae655f2b0326e42594009e4edb3ce7ea1380acce9492e25bad244e282082bddafdeac649fc57b77ee9b4b987c4aa94456e681136a5d0096d1080dea11ae67597532cefeb394d4384314ace684e75ab9e48daee3ad109887bc22a202a4794d9ae6e169b432a43a41dcca80866cc11186eaf5aac30711709e2a5fa01df6eef94dcf6ea0ad8504cd6a7cee82a655b0d2f273fe3a0a58b28af60282d3890e6280a45dfd39e2ca8094b8dff7fe88e37613d818d468b8907eeb0deaee91f47fc00d0e1228acaa5fd4c0b751f6cdb7e3a9bf0c862a1849fbbd552ccb702185eb3cd90f3fd8da37e06526a289e3b7eb92ff446dc75b23857eac5d78078a8c31c3165262c7649506bcf29482408e7628c337d66a1f7065301c11f3b3d09be4dfe16a1dcfde335f27b872bc2ec9505d5dc5dd9b177be5a7908274b45d9fff1cc8db6003bdc75e2718adb93dc26e06fbb9c829f6420f6975d05dbb06b8e0b60a62b0e90faac55d58c516d3fef1263a163e8736acf1aee6133d0253c5ed41da1986fd90a283dc99cf675d8ba6696af0e83b3b33", 0x1000}, {&(0x7f0000004100)="36a6510c3eebbc5d1ff4b14cd60820efb1e2a0e5bb9a2e979c893d195dd4471998c3b8423159b60a4e13a39aaeacfbe387b29e1376d61e21990db7b5738ae03fb4b451d53babc59b82b2591c7d25898f6bcb522ba73d0c0331d8c03450deb396bf", 0x61}, {&(0x7f0000004180)="1bc231be412c09e304c325697b549f849b7be09cdb13c5a86d031ab5e1eb28deb5f9ba963a74bea757c3274b68c17fa9f54ecc9a3e829453c6fd3fecd309af39f07eaf28f060a976c63db66bbe266f0f9afac2ffc56554f5eab8cdb129e51c7afe53827bd8f191d94f656029645c2603ccfd60f8e99bf7167e67b1e2cf29420f44f9b8c36a1d9947b313", 0x8a}, {&(0x7f0000004240)="4bb2027dcab3888c7396d1a6d5f8695eac3ac45d21787278daf9eaa38cbed030355ae5e0772ed00a067898a68fedae9e948fb17d425751399e2db666f8ba29834cf55d7c7236808bd48064ab3497f18d4ab9af8414007ec1b703a6", 0x5b}], 0x6, &(0x7f0000004340)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@end, @noop, @ra={0x94, 0x6, 0x8}, @lsrr={0x83, 0x1b, 0x8, [@empty, @remote, @local, @multicast2, @remote, @loopback]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14}}], 0x80}}, {{&(0x7f00000043c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10, &(0x7f0000005500)=[{&(0x7f0000004400)="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", 0x1000}, {&(0x7f0000005400)="12bd6016f23e66cd7c0a152303bd961e7bfd58a5b75f460998910a1481c2be470f4159bdd17aaf5364a0e3d187882a902212de55d6665f4923ff0a770db2088f632a9a061ab009bf8b609eb20a949b5a79d5c51bc3c7d2a52732d955c0ea", 0x5e}, {&(0x7f0000005480)="bb981e18d57925664ccd00905d3849ee0457f64d1009bd2d10fd61dda0ae1db486ec92705155c87ecb6591cbbe1f6c8da7593bffe5e13b40025a905675cf8ae134cb417ee9e4324804cbaff430386c9ed88c3d41f89023e7c362c9cba7a996c5b035c02cd301cf1a343a7ce3083b9298c7c1b40422d52eeb", 0x78}], 0x3, &(0x7f0000005540)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffffffffffff}}, @ip_retopts={{0x48, 0x0, 0x7, {[@cipso={0x86, 0x28, 0x800, [{0x7, 0x5, "b4fb2e"}, {0x5, 0x5, "fb57cd"}, {0x6, 0x5, "965610"}, {0x0, 0x3, "7f"}, {0x0, 0x9, "8d5a336b13f591"}, {0x7, 0x7, "ac70e3658e"}]}, @timestamp={0x44, 0x10, 0x400, 0x0, 0x2461, [{[], 0x2}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0xe17}]}]}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x9}, @rr={0x7, 0x17, 0x7fff, [@remote, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @local, @dev={0xac, 0x14, 0x14, 0x24}]}, @ra={0x94, 0x6, 0x1}, @end, @timestamp={0x44, 0x10, 0x4, 0x3, 0x401, [{[@loopback], 0x467}, {[], 0x7}]}, @generic={0x0, 0xe, "2dfd89801ffd01bb54ca914e"}]}}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x128}}, {{&(0x7f0000005680)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000005900)=[{&(0x7f00000056c0)="9b5a776be3586bcdb99a91ee", 0xc}, {&(0x7f0000005700)}, {&(0x7f0000005740)="a878108e37f9153a8dd16823bdcb04bca7cd4cd6c0791180c7f3528cfb5e37160a1a9e9020752884e6aaa0240c945a8ba2668ff4f53c9edc5cc5f40b99426eab7fe5e38bb35bcc619f373ffa166b0b98d521cbbbd9606d025afe1709ec55e5abe89b54c139a87c8d7326d7be630a64", 0x6f}, {&(0x7f00000057c0)="834b3186d1f31a64d2a9373279948dd8c0b89ab90a1e77b4c78bb3df94c25f4f658aebfb78221648cde1778e0fd2355eaf3bb866fb3b7da34add7e91a7815a00b9607fd0962d499b9e6350194b1b2afc0c32159f71827703900e1512eb5af10282372e8de7b868ec06134b17a1570433b9ca8932391e40b15924f5cb50edbf693afc72f1f1b6224c93c3e2dbf27d95b76e3de9c24289247222b580b16cb1a1f17cdc3d2c2a4da62caaf460ffc394df8e91ae9f8b21bb168ca3874d273238e5254fd90c037d64177e7261d910b730ba8efbd3959a1095d0e75f07cd5cf6ac2a532e4f4cb70c788d13f8e165c9d8bc7e183daf392782133e059ccb051a11ea", 0xfe}, {&(0x7f00000058c0)="ea6c85a4", 0x4}], 0x5, &(0x7f0000007100)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3e0000}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@ra={0x94, 0x6, 0xa0}, @ssrr={0x89, 0x7, 0x2, [@broadcast]}, @end, @timestamp={0x44, 0x10, 0x5f, 0x1, 0xff, [{[], 0x7}, {[], 0x19b}, {[], 0x5}]}, @generic={0x9f, 0x5, "cc7f02"}, @rr={0x7, 0xf, 0x2b2c682e, [@multicast1, @dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x733]}, @ssrr={0x89, 0x7, 0x5, [@remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@rr={0x7, 0x7, 0xfffffffffffffff7, [@dev={0xac, 0x14, 0x14, 0x13}]}, @rr={0x7, 0xb, 0x80000000, [@local, @local]}, @timestamp={0x44, 0x8, 0x2, 0x1, 0x6, [{[], 0x100000000}]}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0xd0}}], 0x7, 0x20000000) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffe6b, 0x6d, 0x0, 0x0) [ 251.044066] FAULT_INJECTION: forcing a failure. [ 251.044066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 251.094599] CPU: 0 PID: 13663 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 251.101756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.111135] Call Trace: [ 251.113733] dump_stack+0x138/0x19c [ 251.117376] should_fail.cold+0x10f/0x159 [ 251.121531] ? __might_sleep+0x93/0xb0 [ 251.125430] __alloc_pages_nodemask+0x1d6/0x7a0 [ 251.130113] ? __alloc_pages_slowpath+0x2930/0x2930 [ 251.135138] ? lock_downgrade+0x6e0/0x6e0 [ 251.139301] alloc_pages_vma+0xc9/0x4c0 [ 251.143276] shmem_alloc_page+0xf6/0x1a0 [ 251.147328] ? shmem_swapin+0x1a0/0x1a0 [ 251.151299] ? cred_has_capability+0x142/0x290 [ 251.155887] ? check_preemption_disabled+0x3c/0x250 [ 251.160900] ? __this_cpu_preempt_check+0x1d/0x30 [ 251.165736] ? percpu_counter_add_batch+0x112/0x160 [ 251.170744] ? __vm_enough_memory+0x26a/0x490 [ 251.175235] shmem_alloc_and_acct_page+0x12a/0x680 [ 251.180160] shmem_getpage_gfp+0x3e7/0x25d0 [ 251.184485] ? shmem_add_to_page_cache+0x860/0x860 [ 251.189408] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 251.194590] shmem_write_begin+0xfd/0x1b0 [ 251.198730] ? trace_hardirqs_on_caller+0x400/0x590 [ 251.203739] generic_perform_write+0x1f8/0x480 [ 251.208322] ? page_endio+0x530/0x530 [ 251.212135] ? current_time+0xb0/0xb0 [ 251.215927] ? generic_file_write_iter+0x9a/0x660 [ 251.220765] __generic_file_write_iter+0x239/0x5b0 [ 251.225687] generic_file_write_iter+0x303/0x660 [ 251.230445] __vfs_write+0x4a7/0x6b0 [ 251.234151] ? selinux_file_open+0x420/0x420 [ 251.238555] ? kernel_read+0x120/0x120 [ 251.242437] ? check_preemption_disabled+0x3c/0x250 [ 251.247449] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 251.252987] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 251.257732] ? __sb_start_write+0x153/0x2f0 [ 251.262048] vfs_write+0x198/0x500 [ 251.266585] SyS_pwrite64+0x115/0x140 [ 251.270374] ? SyS_pread64+0x140/0x140 [ 251.274254] ? do_syscall_64+0x53/0x640 [ 251.278233] ? SyS_pread64+0x140/0x140 [ 251.282117] do_syscall_64+0x1e8/0x640 [ 251.285991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.290831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 251.296010] RIP: 0033:0x413777 [ 251.299186] RSP: 002b:00007f498c7579f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 251.307060] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 251.314332] RDX: 0000000000000040 RSI: 0000000020000080 RDI: 0000000000000005 [ 251.321590] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000046505845 [ 251.328847] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000005 [ 251.336108] R13: 0000000000000005 R14: 00007f498c7586d4 R15: 0000000000000004 [ 251.410631] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 251.431705] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 251.456021] loop1: p1[EZD] [ 251.490876] ldm_validate_privheads(): Disk read failed. [ 251.496314] loop0: p1[EZD] [ 251.499246] loop0: partition table partially beyond EOD, truncated [ 251.588597] loop0: p1 start 1 is beyond EOD, truncated 03:26:24 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = dup3(r0, r0, 0x80000) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x140) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4000, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:26:24 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x517602, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x4, &(0x7f00000000c0)=0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x6a}, 0x8) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000300)={r3, &(0x7f0000000280)=""/76}) getsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x3) 03:26:24 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 03:26:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x34e, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000be00000000d7000000100000009500000000000000"], &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70) 03:26:24 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008500)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000140)=[{}, {&(0x7f0000000240)=""/225, 0xe1}, {&(0x7f0000000340)=""/229, 0xe5}], 0x3}, 0x4}, {{&(0x7f0000000180)=@alg, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/244, 0xf4}], 0x1, &(0x7f0000000880)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000600)=""/244, 0xf4}, {&(0x7f0000000700)=""/234, 0xea}, {&(0x7f0000000800)=""/23, 0x17}, {&(0x7f0000002880)=""/48, 0x30}], 0x5, &(0x7f0000002940)=""/105, 0x69}, 0x2}, {{&(0x7f00000029c0)=@alg, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)=""/24, 0x18}, {&(0x7f0000002a80)=""/119, 0x77}, {&(0x7f0000002b00)=""/57, 0x39}], 0x3, &(0x7f0000002b80)=""/229, 0xe5}, 0xffffffff}, {{&(0x7f0000002c80)=@rc, 0x80, &(0x7f0000004280)=[{&(0x7f0000002d00)=""/188, 0xbc}, {&(0x7f0000002dc0)=""/104, 0x68}, {&(0x7f0000002e40)=""/188, 0xbc}, {&(0x7f0000002f00)=""/108, 0x6c}, {&(0x7f0000002f80)=""/100, 0x64}, {&(0x7f0000003000)=""/90, 0x5a}, {&(0x7f0000003080)=""/240, 0xf0}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/236, 0xec}], 0x9, &(0x7f0000004340)=""/123, 0x7b}, 0x1}, {{&(0x7f00000043c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000005440)=[{&(0x7f0000004440)=""/4096, 0x1000}], 0x1, &(0x7f0000005480)=""/4096, 0x1000}, 0xff}, {{&(0x7f0000006480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000068c0)=[{&(0x7f0000006500)=""/153, 0x99}, {&(0x7f00000065c0)=""/84, 0x54}, {&(0x7f0000006640)=""/5, 0x5}, {&(0x7f0000006680)=""/56, 0x38}, {&(0x7f00000066c0)=""/8, 0x8}, {&(0x7f0000006700)=""/24, 0x18}, {&(0x7f0000006740)=""/225, 0xe1}, {&(0x7f0000006840)=""/94, 0x5e}], 0x8, &(0x7f0000006940)=""/215, 0xd7}, 0x800}, {{&(0x7f0000006a40)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000007c40)=[{&(0x7f0000006ac0)=""/114, 0x72}, {&(0x7f0000006b40)=""/4096, 0x1000}, {&(0x7f0000007b40)=""/29, 0x1d}, {&(0x7f0000007b80)=""/29, 0x1d}, {&(0x7f0000007bc0)=""/124, 0x7c}], 0x5, &(0x7f0000007cc0)=""/122, 0x7a}, 0x8000}, {{&(0x7f0000007d40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f00000080c0)=[{&(0x7f0000007dc0)=""/52, 0x34}, {&(0x7f0000007e00)=""/145, 0x91}, {&(0x7f0000007ec0)=""/54, 0x36}, {&(0x7f0000007f00)=""/58, 0x3a}, {&(0x7f0000007f40)=""/184, 0xb8}, {&(0x7f0000008000)=""/183, 0xb7}], 0x6, &(0x7f0000008140)=""/162, 0xa2}, 0x100000000}, {{&(0x7f0000008200)=@tipc=@name, 0x80, &(0x7f00000083c0)=[{&(0x7f0000008280)=""/246, 0xf6}, {&(0x7f0000008380)=""/29, 0x1d}], 0x2, &(0x7f0000008400)=""/241, 0xf1}, 0x1}], 0xa, 0x140, &(0x7f0000008780)) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000008800)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000088c0)={&(0x7f00000087c0)={0x10, 0x0, 0x0, 0x540000}, 0xc, &(0x7f0000008880)={&(0x7f0000008a00)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000429bd7000ffdbdf2502000000080002000a00000004000500"], 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0x0, 0xfec5}, 0x10) 03:26:24 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000100)={0x0, 0x4, [0x7]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:24 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) 03:26:24 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x440, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x312daae4]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000080)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0xbad}, 0x10) sendmsg$can_bcm(r3, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x16) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e31, 0x0, @local}, 0x1c) 03:26:24 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x1a1200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="350800e2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x2c) connect$caif(r0, &(0x7f0000000200)=@rfm={0x25, 0x9, "b3d40ed02d4b6b7db5197a1d8a3da9b3"}, 0x18) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000440)={0x7a, "025ce7727d5cb42d8f1ba5dc0b050200000000000000407727c5e40555d6f94c7e26fce25929cee8a0525b4c7930d2d298c8997970cdcaddf0b964439250051d0ba5679ce360a51303c1883c19951af385355181bab520f166d5f85bc2093473fe7aabb6ed4f6afd9c749f8bffce1c34f0a700891a98d59a894b7d32479b00"}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f00000003c0)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000001c0)=r2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0xf, @pix={0x3800000, 0x2, 0x32314142, 0x7, 0x10000, 0x0, 0x9, 0x80000000, 0x1, 0x3, 0x1, 0x7}}) recvmmsg(0xffffffffffffffff, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfff, 0x30, 0x3, 0x4}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={r3, @in={{0x2, 0x4e20, @multicast1}}, 0x100000000, 0x3, 0xa8, 0x100, 0x40}, 0x98) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x2082) [ 252.801948] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 252.824140] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 252.824328] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 252.845568] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 252.849579] loop1: p1[EZD] [ 252.866245] loop5: p1[EZD] [ 252.874131] loop5: p1 size 2047 extends beyond EOD, truncated 03:26:25 executing program 3: capset(&(0x7f0000000580)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) r0 = socket$inet(0x10, 0x0, 0x8) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00t\x00\x00\x00\xe4\xff\xff\xff', @ifru_flags}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff01, 0x200) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x1000, 0x4000}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7ff, 0x5, 0x202, 0x3, 0x20, 0x200000000000000, 0xd33, 0xd35, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000200)={r3, @in={{0x2, 0x4e24, @remote}}}, 0x84) sched_setscheduler(r2, 0x5, &(0x7f0000000100)=0x7ff) 03:26:25 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:25 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="738d626a5f757365723d5d2c00"]) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 253.042940] audit: type=1400 audit(1564716385.095:73): avc: denied { create } for pid=13811 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 [ 253.231115] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 253.255812] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 253.266324] loop1: p1[EZD] [ 253.310761] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 253.327923] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 253.367208] loop0: p1[EZD] [ 253.376185] loop0: p1 size 2047 extends beyond EOD, truncated 03:26:26 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xb673, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000040)='\a\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x9, 0xfffffffffffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, 0x0, 0x1}, 0x10}, 0x70) 03:26:26 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x58) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYPTR], 0x8) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 03:26:26 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:26 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1080, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x0, 0x0, @ioapic={0x1f000, 0xfffffffeffffffff}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x1, 0x100000001, 0x9, 0x9228, 0x290140000000000, 0xe0e, 0x6, 0x4, 0x3, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x4, 0x3, 0x100000001, 0x3, 0xd7], 0x6000, 0x240001}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x240}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x5, 0x0) [ 254.403735] QAT: Invalid ioctl 03:26:26 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0xca) utimes(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x3000000000000}}) [ 254.490481] QAT: Invalid ioctl 03:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@mcast1, 0x10, r1}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0xe43f8b29af442d9e) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000080)={0xf, 0x5, 0x3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@mcast2, 0x0, r1}) 03:26:26 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) socket$nl_generic(0x10, 0x3, 0x10) read(r2, 0x0, 0x82) tkill(r0, 0x1004000000016) [ 254.562095] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 254.598855] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:26 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$rxrpc(0x21, 0x2, 0x7) accept$unix(r1, &(0x7f0000000080), &(0x7f0000000140)=0x6e) sendmsg$inet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_u8={{0x11}}], 0x51}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) [ 254.620833] loop0: p1[EZD] [ 254.621049] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 254.637536] loop0: p1 size 2047 extends beyond EOD, truncated 03:26:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x0, 0x0, @ioapic={0x1f000, 0xfffffffeffffffff}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x1, 0x100000001, 0x9, 0x9228, 0x290140000000000, 0xe0e, 0x6, 0x4, 0x3, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x4, 0x3, 0x100000001, 0x3, 0xd7], 0x6000, 0x240001}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x240}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x5, 0x0) [ 254.663335] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 254.673215] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 254.695366] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 254.710410] loop5: p1[EZD] 03:26:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000040000800) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000280), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000055}, 0x98) [ 254.732541] loop1: p1[EZD] 03:26:26 executing program 3: io_setup(0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = accept4(r0, &(0x7f0000000200)=@can, &(0x7f00000001c0)=0x80, 0x99359a694880bf26) setsockopt$inet6_tcp_int(r1, 0x6, 0x4000000000000017, &(0x7f0000000080)=0x7, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200, 0x20) r4 = dup(r3) dup(r4) mlock(&(0x7f0000bde000/0x4000)=nil, 0x4000) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r5, &(0x7f0000001700)=[{&(0x7f0000000280)=""/127, 0x7f}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/150, 0x96}, {&(0x7f00000013c0)=""/160, 0xa0}, {&(0x7f0000001480)=""/220, 0xdc}, {&(0x7f0000001580)=""/130, 0x82}, {&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000180)=""/13, 0xd}, {&(0x7f0000001640)=""/94, 0x5e}, {&(0x7f00000016c0)=""/59, 0x3b}], 0xa) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f0000000100)) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x5, 0x5, 0x8, 0x5, 0x466d0ccd, 0x5, 0x11c, 0xffffffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, 0x0) 03:26:26 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r2 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:modem_device_t:s0\x00', 0x24, 0x1) clone(0x114200, &(0x7f0000000000)="b9c42345ffb092c20e103282f74d4575941b37b748ec1695f2b91a02292d4c2883", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)="2202776218ec27de9298a0bcdc02a2d2c85cc84e444f083a0c766d5dac9da14ca559bc7bcf0554b6bba51f07a88b0351576761dfd07e7719342c3c78d3944b43a9dc808ed93ca31d577693e90312395f4ac0cc5e0b9e449c172dbadf1bf446679e019d523ad84c5896dfeb4003105a9742c9bf4a0c1c3f8320ffb0b15ec3b456c72ca6a9613fa943cc2d15e9d7d93c9064b231ae51445debcaadf09a94c1cd0256c936890cfd5ea2449920ba36d9a45a6d0089b7954a22675be5d31de2dc4b373fede5bc4478518093872feba5fc6c822b89aaf0ac6f664cd37d9aa95efd68acb35114cd0fe830e1f30512074aa6e1b024f0") 03:26:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x40) setsockopt$inet_buf(r1, 0x0, 0x3f, &(0x7f0000000040)="d19857697a6420b9df4abd1566845e1ae39dab98d39f638259e84970ef2cc0e9bffa3c134c7e104150a94d9d0ec7be965c7915254797ffb3caae20392bbc24c3000ac2", 0x43) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, 0x3, 'queue0\x03\xe8\x00'}) 03:26:26 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") 03:26:26 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000919447f36ce89202d5b814d114f451e03847d2fe7c99f5182c827399b1b905da9bf5f7c6e004eff1ca99990be260793a815c0c1d7c493bcebd6766a73bf82ed782b4762d9c52002aa4c6d88bc7cf948faed09f8eab04f27e4e7140f0d1aa"]) socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x200, 0x0, 0x0, 0x10001}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2) bpf$MAP_CREATE(0x2, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000240)={0x0, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x44, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x0) sendfile(r1, r1, 0x0, 0x80000001) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0xff, 0x2, 0x6, 0xc841, 0x401, 0xf9}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) write$P9_RLERROR(r2, &(0x7f00000003c0)={0x10, 0x7, 0x1, {0x7, 'TIPCv2\x00'}}, 0x10) socket$tipc(0x1e, 0x5, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:26:27 executing program 3: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") [ 254.951446] rtc_cmos 00:00: Alarms can be up to one day in the future 03:26:27 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x3c) fcntl$setstatus(r0, 0x4, 0x800000000004bfa) 03:26:27 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x20000000000b04, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x121) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141046, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="8a2858f05d57a02ad9b137f47d0700150031c990030d7f720789fa3afb6e70f9b68f53309b1a003177af1b7ededd9bfffb47697145fb5970574bfb00e96f773a3b11c403c19f3869930dc5a99f55ef7a1d9447c95289e21a4ba42e3fca737f0e754fa69c61151b821c7850be55cb9aa6c15feb6be9019309e3976f5591f51c7000004a048693c4a5f91b895715b9b005adc4c3176473c76a152fea92"]) [ 255.120771] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 255.163436] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 255.190683] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 255.208303] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 255.219743] loop0: p1[EZD] [ 255.223904] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 255.238910] loop0: p1 size 2047 extends beyond EOD, truncated [ 255.245262] loop1: p1[EZD] [ 255.248775] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:27 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") [ 255.265499] loop3: p1[EZD] 03:26:27 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='sbbj_User=],\x00']) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$1(0xffffff1f, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x2, 0x6, 0x8, 0xae4e, 0x6, 0x80, 0x1}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x3}) 03:26:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000d8833995a28f2dbb0000", @ANYRES16=r1, @ANYBLOB="03070000000000000000070000000c0002000600020000000000"], 0x20}}, 0x0) [ 255.407532] audit: type=1400 audit(1564716387.455:74): avc: denied { relabelto } for pid=13987 comm="syz-executor.0" name="file0" dev="sda1" ino=17062 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modem_device_t:s0 tclass=lnk_file permissive=1 [ 255.502174] audit: type=1804 audit(1564716387.545:75): pid=14032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir183135729/syzkaller.Qe7nGF/169/bus" dev="sda1" ino=17061 res=1 03:26:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xfffffffffffffffc) fallocate(r0, 0x40, 0x0, 0x7) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0/f.le.\x00') renameat(r2, &(0x7f00000001c0)='.//ile0\x00', 0xffffffffffffffff, 0x0) 03:26:27 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]}) r0 = socket$bt_rfcomm(0x1f, 0x100000000000000, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x400500) getsockopt(r0, 0x7, 0x7f, &(0x7f0000000240)=""/136, &(0x7f0000000300)=0x449) write$ppp(r1, &(0x7f00000000c0)="607d3f8f91333f46d8b263c80a0e7c5b5df760bfc240097783afb6bedf7ce5b2be75171b4750e8ec98cbe762069c8e37aa0f053a5742dfc8b0660307c9d4118be8237f3c8d5e11102fbe7e86260f421c1d4ab5441751315dc70cea9b8f74f58f4df2d68cb6803329945ad07b1583", 0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) fchdir(r0) recvfrom$packet(r1, &(0x7f0000000340)=""/105, 0x69, 0x40, &(0x7f0000000540)={0x11, 0xf7, r2, 0x1, 0x6, 0x6, @local}, 0x14) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x0, 0xbb}, 'port1\x00', 0x8, 0x80000, 0x9b, 0xfff, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x3, 0xe7e}) 03:26:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x3, 0xc, [0xdee5, 0x2, 0x81]}) time(&(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) unshare(0x20000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001540)={0x0, 0x100000000, 0x0, 'queue0\x00', 0x7}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000540)="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") ioctl$KDGKBMODE(r0, 0x4b44, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000001600)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0xc0}, 0x4000014) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x7, 0x1d2f, 0x6, 0x0, 0x9, 0xae6c}) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000080), 0x4) getsockname$ax25(r3, &(0x7f0000000340)={{0x3, @null}, [@rose, @rose, @remote, @default, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000180)=0x48) 03:26:27 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000) sendto$inet(r1, &(0x7f0000000080)="ffa334fee2d5f68975473022bac65f9451ab0ae486ea46643396c2faacf8deb10c5d9c900e2d788b0d9066627d65e12c8e3b6aa5c38473c86c1f2ccbf3d29c5676d229a4b811a1e246a940e8984a809388fa9b3b70cadec9442a04dbeece1d70eeaa02d9c7e5de86682c8db6af6c19a486ad8f81086e257f5a310cd4148ba82f7acf5629a9a0a0c022bfff6b246c9dbdfa37e47918a4383b60a12bec3618125778335bd754c7d148a11525f2195293aa6697a48f650499a12875f84d3eda5bd3aa57d44a0273e1dd3b62da5518ea8314328ad339b4e87f3c628914be2acc577c533b325075a85fdef7cf8b22f0bc6048f8d5d507b358fa27ea", 0xf9, 0x4000000, 0x0, 0x0) [ 255.617168] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 255.637100] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 255.643842] loop1: p1[EZD] [ 255.658555] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:26:27 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in, @in=@local}, {0x0, 0xfffffffffffffffe}, {0x0, 0x4}}, {{@in6=@rand_addr="a7c2fbe3a6501515791a426a990b64ea"}, 0x0, @in=@remote}}, 0xe8) [ 255.696167] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:26:27 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") [ 255.747423] loop5: p1[EZD] 03:26:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) time(&(0x7f0000000040)) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) unshare(0x20000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000001540)={0x0, 0x100000000, 0x0, 'queue0\x00', 0x7}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, 0x0) ustat(0x5, &(0x7f0000000500)) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080), 0x4) getsockname$ax25(r2, &(0x7f0000000340)={{0x3, @null}, [@rose, @rose, @remote, @default, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000180)=0x48) 03:26:28 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x3, 0x2) r1 = semget$private(0x0, 0x3, 0x2) semctl$GETZCNT(r1, 0x3, 0xf, &(0x7f0000000080)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x3, r0}) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000100)=""/67, &(0x7f0000000180)=0x43) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x1d78000000000000) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r2, 0xffff, r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x81000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44040}, 0x24008084) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'veth1_to_hsr\x00', 0x1800}) write$rfkill(r0, &(0x7f0000000500)={0x6, 0x4, 0x0, 0x0, 0x1}, 0x8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000540)=""/2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000580)={0x895, 0x101, 0x8001}) ioctl$TCGETS(r0, 0x5401, &(0x7f00000005c0)) eventfd(0x7) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000600)="5752cadb6df9ed9180c85df9296b3f6c", 0x10) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) mknod(&(0x7f0000000640)='./file0\x00', 0x8000, 0x80000000) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000740)=[{{}, 0x11, 0x1000, 0x80000000}, {{r5, r6/1000+30000}, 0x0, 0x8e0000000000}, {{r7, r8/1000+30000}, 0x16, 0x8, 0x4}, {{r9, r10/1000+30000}, 0x13, 0x10000, 0x7}, {{0x0, 0x7530}, 0x16, 0x2, 0x100000001}, {{0x0, 0x7530}, 0x0, 0x2, 0x7}, {{0x0, 0x2710}, 0x17, 0x1f00000000000, 0xffffffffffffff7f}, {{0x77359400}, 0x15, 0x8000, 0x9}, {{0x77359400}, 0x12, 0x4, 0x8}, {{0x0, 0x7530}, 0x4, 0x1f, 0x100000000}], 0xf0) write$FUSE_BMAP(r0, &(0x7f0000000840)={0x18, 0x0, 0x3, {0x7}}, 0x18) init_module(&(0x7f0000000880)='.\x00', 0x2, &(0x7f00000008c0)='\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000900)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000940)=0x10) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000980)="0139b9a48dad1dfcd809c13e0b795af942df251c0457") [ 255.949490] overlayfs: filesystem on './file0' not supported as upperdir 03:26:28 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, 0x0) getdents64(r1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x313, 0x3, 0x0, 0x0, 0x0, 0x3}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@empty, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) r3 = getgid() fchown(r2, 0x0, r3) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000480)) pipe2(0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_GET_FP_MODE(0x2e) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffffffff8001, @mcast2, 0x20}, {0xa, 0x4e24, 0x9, @remote}, r5, 0x1}}, 0x48) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x77}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ftruncate(0xffffffffffffffff, 0x2000000000a48204) r7 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) lchown(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) pread64(r7, 0x0, 0x0, 0x0) getpeername$netlink(r1, 0x0, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000005c0)={"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"}) 03:26:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r1, 0x1, 0x8000, 0x5a1) fallocate(r1, 0x3, 0x5e89, 0xfff9) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x7, 0x4) [ 428.001994] INFO: task syz-executor.5:14048 blocked for more than 140 seconds. [ 428.009698] Not tainted 4.14.135 #31 [ 428.016579] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.024878] syz-executor.5 D27040 14048 7125 0x00000004 [ 428.032882] Call Trace: [ 428.035485] __schedule+0x7b8/0x1cd0 [ 428.039195] ? __mutex_lock+0x737/0x1470 [ 428.043677] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.048854] schedule+0x92/0x1c0 [ 428.054642] schedule_preempt_disabled+0x13/0x20 [ 428.059647] __mutex_lock+0x73c/0x1470 [ 428.064098] ? lo_release+0x20/0x1b0 [ 428.075401] ? mutex_trylock+0x1c0/0x1c0 [ 428.079612] ? blkdev_put+0x7b/0x510 [ 428.083619] ? blkdev_put+0x7b/0x510 [ 428.087469] ? loop_clr_fd+0xae0/0xae0 [ 428.091948] mutex_lock_nested+0x16/0x20 [ 428.096170] ? mutex_lock_nested+0x16/0x20 [ 428.100507] lo_release+0x20/0x1b0 [ 428.104209] ? loop_clr_fd+0xae0/0xae0 [ 428.108763] __blkdev_put+0x434/0x7f0 [ 428.112790] ? bd_set_size+0xb0/0xb0 [ 428.116518] ? wait_for_completion+0x420/0x420 [ 428.121184] blkdev_put+0x88/0x510 [ 428.124720] ? fcntl_setlk+0xb90/0xb90 [ 428.128602] ? blkdev_put+0x510/0x510 [ 428.132448] blkdev_close+0x8b/0xb0 [ 428.136228] __fput+0x275/0x7a0 [ 428.139705] ____fput+0x16/0x20 [ 428.143088] task_work_run+0x114/0x190 [ 428.147142] exit_to_usermode_loop+0x1da/0x220 [ 428.152127] do_syscall_64+0x4bc/0x640 [ 428.156197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.161401] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.166857] RIP: 0033:0x413511 [ 428.170353] RSP: 002b:00007f498c757a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 428.178253] RAX: 0000000000000000 RBX: 00007f498c757b40 RCX: 0000000000413511 [ 428.186182] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000004 [ 428.193487] RBP: 0000000000000000 R08: 00007f498c757b40 R09: 00007f498c757ae0 [ 428.201418] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 428.208982] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff [ 428.216671] INFO: task syz-executor.4:14081 blocked for more than 140 seconds. [ 428.224902] Not tainted 4.14.135 #31 [ 428.229424] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.237675] syz-executor.4 D28832 14081 6883 0x00000004 [ 428.243746] Call Trace: [ 428.246669] __schedule+0x7b8/0x1cd0 [ 428.250765] ? __mutex_lock+0x737/0x1470 [ 428.255441] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.260859] schedule+0x92/0x1c0 [ 428.264225] schedule_preempt_disabled+0x13/0x20 [ 428.269272] __mutex_lock+0x73c/0x1470 [ 428.273420] ? loop_control_ioctl+0x153/0x2f0 [ 428.278202] ? mutex_trylock+0x1c0/0x1c0 [ 428.282506] ? retint_kernel+0x2d/0x2d [ 428.286401] ? trace_hardirqs_on_caller+0x400/0x590 [ 428.291486] ? __radix_tree_lookup+0x1b3/0x2f0 [ 428.296089] mutex_lock_nested+0x16/0x20 [ 428.300618] ? mutex_lock_nested+0x16/0x20 [ 428.305262] loop_control_ioctl+0x153/0x2f0 [ 428.309937] ? loop_add+0x850/0x850 [ 428.313648] ? loop_add+0x850/0x850 [ 428.317398] do_vfs_ioctl+0x7ae/0x1060 [ 428.321371] ? selinux_file_mprotect+0x5d0/0x5d0 [ 428.326133] ? lock_downgrade+0x6e0/0x6e0 [ 428.330332] ? ioctl_preallocate+0x1c0/0x1c0 [ 428.334925] ? __fget+0x237/0x370 [ 428.338395] ? security_file_ioctl+0x89/0xb0 [ 428.343147] SyS_ioctl+0x8f/0xc0 [ 428.346910] ? do_vfs_ioctl+0x1060/0x1060 [ 428.351695] do_syscall_64+0x1e8/0x640 [ 428.355729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.361036] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.366221] RIP: 0033:0x459829 [ 428.369718] RSP: 002b:00007f71dc28ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.377750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 428.385067] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000004 [ 428.392422] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.399788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f71dc28f6d4 [ 428.407609] R13: 00000000004c2f72 R14: 00000000004d65b8 R15: 00000000ffffffff [ 428.415250] INFO: task syz-executor.0:14075 blocked for more than 140 seconds. [ 428.423061] Not tainted 4.14.135 #31 [ 428.427473] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.435839] syz-executor.0 D29184 14075 8063 0x00000004 [ 428.441538] Call Trace: [ 428.444132] __schedule+0x7b8/0x1cd0 [ 428.447836] ? __mutex_lock+0x737/0x1470 [ 428.452316] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.457515] schedule+0x92/0x1c0 [ 428.460971] schedule_preempt_disabled+0x13/0x20 [ 428.465887] __mutex_lock+0x73c/0x1470 [ 428.470232] ? __mutex_unlock_slowpath+0x71/0x800 [ 428.475082] ? __blkdev_get+0x145/0x1120 [ 428.479359] ? mutex_trylock+0x1c0/0x1c0 [ 428.484162] ? exact_match+0xd/0x20 [ 428.488157] ? kobj_lookup+0x314/0x400 [ 428.492270] ? blkdev_ioctl+0x1860/0x1860 [ 428.496540] mutex_lock_nested+0x16/0x20 [ 428.500691] ? mutex_lock_nested+0x16/0x20 [ 428.505136] __blkdev_get+0x145/0x1120 [ 428.509040] ? __blkdev_put+0x7f0/0x7f0 [ 428.513091] ? bd_acquire+0x178/0x2c0 [ 428.517047] ? find_held_lock+0x35/0x130 [ 428.521424] blkdev_get+0xa8/0x8e0 [ 428.525306] ? bd_may_claim+0xd0/0xd0 [ 428.529107] ? _raw_spin_unlock+0x2d/0x50 [ 428.533362] blkdev_open+0x1d1/0x260 [ 428.537483] ? security_file_open+0x89/0x190 [ 428.542156] do_dentry_open+0x73b/0xeb0 [ 428.546134] ? bd_acquire+0x2c0/0x2c0 [ 428.550543] vfs_open+0x105/0x220 [ 428.554167] path_openat+0x8bd/0x3f70 [ 428.557977] ? trace_hardirqs_on+0x10/0x10 [ 428.562700] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 428.567553] ? find_held_lock+0x35/0x130 [ 428.571986] ? __alloc_fd+0x1d4/0x4a0 [ 428.575795] do_filp_open+0x18e/0x250 [ 428.579801] ? may_open_dev+0xe0/0xe0 [ 428.583813] ? _raw_spin_unlock+0x2d/0x50 [ 428.588076] ? __alloc_fd+0x1d4/0x4a0 [ 428.592117] do_sys_open+0x2c5/0x430 [ 428.595920] ? filp_open+0x70/0x70 [ 428.599724] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 428.605339] SyS_open+0x2d/0x40 [ 428.608631] ? do_sys_open+0x430/0x430 [ 428.612964] do_syscall_64+0x1e8/0x640 [ 428.616848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.622054] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.627526] RIP: 0033:0x413711 [ 428.630810] RSP: 002b:00007f86267efa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 428.639417] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 428.647550] RDX: 00007f86267efb0a RSI: 0000000000000002 RDI: 00007f86267efb00 [ 428.655689] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 428.663407] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 428.671224] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff [ 428.678610] INFO: task syz-executor.0:14079 blocked for more than 140 seconds. [ 428.686579] Not tainted 4.14.135 #31 [ 428.690973] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.699464] syz-executor.0 D29032 14079 8063 0x00000004 [ 428.705347] Call Trace: [ 428.707980] __schedule+0x7b8/0x1cd0 [ 428.711915] ? __mutex_lock+0x737/0x1470 [ 428.716177] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.721403] schedule+0x92/0x1c0 [ 428.724926] schedule_preempt_disabled+0x13/0x20 [ 428.729672] __mutex_lock+0x73c/0x1470 [ 428.733776] ? blkdev_reread_part+0x1f/0x40 [ 428.738524] ? mutex_trylock+0x1c0/0x1c0 [ 428.743387] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 428.748499] ? __wake_up_common_lock+0xe3/0x160 [ 428.753550] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 428.759238] mutex_lock_nested+0x16/0x20 [ 428.763871] ? mutex_lock_nested+0x16/0x20 [ 428.768110] blkdev_reread_part+0x1f/0x40 [ 428.772407] loop_reread_partitions+0x7c/0x90 [ 428.777326] loop_set_status+0xc25/0x11f0 [ 428.781708] loop_set_status64+0xa6/0xf0 [ 428.785770] ? loop_set_status_old+0x2d0/0x2d0 [ 428.790861] ? avc_ss_reset+0x110/0x110 [ 428.794844] lo_ioctl+0x5c1/0x1ce0 [ 428.798646] ? loop_probe+0x160/0x160 [ 428.802911] blkdev_ioctl+0x96b/0x1860 [ 428.806987] ? blkpg_ioctl+0x980/0x980 [ 428.811260] ? __might_sleep+0x93/0xb0 [ 428.815730] ? __fget+0x210/0x370 [ 428.819182] block_ioctl+0xde/0x120 [ 428.822907] ? blkdev_fallocate+0x3b0/0x3b0 [ 428.827228] do_vfs_ioctl+0x7ae/0x1060 [ 428.831167] ? selinux_file_mprotect+0x5d0/0x5d0 [ 428.836141] ? lock_downgrade+0x6e0/0x6e0 [ 428.840571] ? ioctl_preallocate+0x1c0/0x1c0 [ 428.845313] ? __fget+0x237/0x370 [ 428.848775] ? security_file_ioctl+0x89/0xb0 [ 428.853279] SyS_ioctl+0x8f/0xc0 [ 428.856733] ? do_vfs_ioctl+0x1060/0x1060 [ 428.861473] do_syscall_64+0x1e8/0x640 [ 428.865373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.870698] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.876059] RIP: 0033:0x459697 [ 428.879243] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 428.887256] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000459697 [ 428.894564] RDX: 00007f86267ceab0 RSI: 0000000000004c04 RDI: 0000000000000003 [ 428.902360] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 428.909880] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000006 [ 428.917628] R13: 0000000000000006 R14: 0000000000000003 R15: 00000000ffffffff [ 428.925162] INFO: task syz-executor.1:14086 blocked for more than 140 seconds. [ 428.932925] Not tainted 4.14.135 #31 [ 428.937191] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.945263] syz-executor.1 D28592 14086 6884 0x00000004 [ 428.951019] Call Trace: [ 428.953616] __schedule+0x7b8/0x1cd0 [ 428.957546] ? __mutex_lock+0x737/0x1470 [ 428.961796] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.967101] schedule+0x92/0x1c0 [ 428.970696] schedule_preempt_disabled+0x13/0x20 [ 428.975456] __mutex_lock+0x73c/0x1470 [ 428.979914] ? __mutex_unlock_slowpath+0x71/0x800 [ 428.984994] ? __blkdev_get+0x145/0x1120 [ 428.989055] ? mutex_trylock+0x1c0/0x1c0 [ 428.993159] ? exact_match+0xd/0x20 [ 428.997136] ? kobj_lookup+0x314/0x400 [ 429.001521] ? blkdev_ioctl+0x1860/0x1860 [ 429.005741] mutex_lock_nested+0x16/0x20 [ 429.009889] ? mutex_lock_nested+0x16/0x20 [ 429.014176] __blkdev_get+0x145/0x1120 [ 429.018062] ? __blkdev_put+0x7f0/0x7f0 [ 429.022307] ? bd_acquire+0x178/0x2c0 [ 429.026929] ? find_held_lock+0x35/0x130 [ 429.031198] blkdev_get+0xa8/0x8e0 [ 429.034781] ? bd_may_claim+0xd0/0xd0 [ 429.038592] ? _raw_spin_unlock+0x2d/0x50 [ 429.043286] blkdev_open+0x1d1/0x260 [ 429.047582] ? security_file_open+0x89/0x190 [ 429.052082] do_dentry_open+0x73b/0xeb0 [ 429.056056] ? bd_acquire+0x2c0/0x2c0 [ 429.059854] vfs_open+0x105/0x220 [ 429.063385] path_openat+0x8bd/0x3f70 [ 429.067321] ? trace_hardirqs_on+0x10/0x10 [ 429.071662] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 429.076580] ? find_held_lock+0x35/0x130 [ 429.081204] ? __alloc_fd+0x1d4/0x4a0 [ 429.085162] do_filp_open+0x18e/0x250 [ 429.088964] ? may_open_dev+0xe0/0xe0 [ 429.092857] ? _raw_spin_unlock+0x2d/0x50 [ 429.097004] ? __alloc_fd+0x1d4/0x4a0 [ 429.100884] do_sys_open+0x2c5/0x430 [ 429.104759] ? filp_open+0x70/0x70 [ 429.108287] ? fput+0xd4/0x150 [ 429.111591] ? SyS_pwrite64+0xca/0x140 [ 429.115477] SyS_open+0x2d/0x40 [ 429.118744] ? do_sys_open+0x430/0x430 [ 429.122704] do_syscall_64+0x1e8/0x640 [ 429.126923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.132721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.138163] RIP: 0033:0x413711 [ 429.141588] RSP: 002b:00007f5f7ecfd9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 429.150917] RAX: ffffffffffffffda RBX: 00007f5f7ecfe6d4 RCX: 0000000000413711 [ 429.158377] RDX: 00007f5f7ecfdbaa RSI: 0000000000000002 RDI: 00007f5f7ecfdba0 [ 429.165747] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 429.173775] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 429.181389] R13: 0000000000000006 R14: 00007f5f7ecfe6d4 R15: 00000000ffffffff [ 429.188928] INFO: task syz-executor.1:14094 blocked for more than 140 seconds. [ 429.196379] Not tainted 4.14.135 #31 [ 429.200827] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.209143] syz-executor.1 D29152 14094 6884 0x00000004 [ 429.215080] Call Trace: [ 429.217994] __schedule+0x7b8/0x1cd0 [ 429.221891] ? __mutex_lock+0x737/0x1470 [ 429.226321] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.231533] schedule+0x92/0x1c0 [ 429.234989] schedule_preempt_disabled+0x13/0x20 [ 429.239740] __mutex_lock+0x73c/0x1470 [ 429.243976] ? trace_hardirqs_on+0x10/0x10 [ 429.248408] ? lo_open+0x1d/0xb0 [ 429.251853] ? refcount_inc_not_zero+0x80/0xe0 [ 429.256943] ? mutex_trylock+0x1c0/0x1c0 [ 429.261881] ? find_held_lock+0x35/0x130 [ 429.265946] ? disk_get_part+0x9c/0x140 [ 429.270190] ? lock_downgrade+0x6e0/0x6e0 [ 429.274500] ? loop_unregister_transfer+0x90/0x90 [ 429.279551] mutex_lock_nested+0x16/0x20 [ 429.285016] ? mutex_lock_nested+0x16/0x20 [ 429.289410] lo_open+0x1d/0xb0 [ 429.292667] __blkdev_get+0x2c7/0x1120 [ 429.296552] ? __blkdev_put+0x7f0/0x7f0 [ 429.300755] ? bd_acquire+0x178/0x2c0 [ 429.304554] ? find_held_lock+0x35/0x130 [ 429.309032] blkdev_get+0xa8/0x8e0 [ 429.312838] ? bd_may_claim+0xd0/0xd0 [ 429.316643] ? _raw_spin_unlock+0x2d/0x50 [ 429.320862] blkdev_open+0x1d1/0x260 [ 429.324769] ? security_file_open+0x89/0x190 [ 429.329183] do_dentry_open+0x73b/0xeb0 [ 429.333224] ? bd_acquire+0x2c0/0x2c0 [ 429.337021] vfs_open+0x105/0x220 [ 429.340719] path_openat+0x8bd/0x3f70 [ 429.344529] ? trace_hardirqs_on+0x10/0x10 [ 429.348893] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 429.353642] ? find_held_lock+0x35/0x130 [ 429.357706] ? __alloc_fd+0x1d4/0x4a0 [ 429.361620] do_filp_open+0x18e/0x250 [ 429.365517] ? may_open_dev+0xe0/0xe0 [ 429.369322] ? _raw_spin_unlock+0x2d/0x50 [ 429.373740] ? __alloc_fd+0x1d4/0x4a0 [ 429.377555] do_sys_open+0x2c5/0x430 [ 429.381354] ? filp_open+0x70/0x70 [ 429.384895] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 429.390926] SyS_open+0x2d/0x40 [ 429.394207] ? do_sys_open+0x430/0x430 [ 429.398274] do_syscall_64+0x1e8/0x640 [ 429.402272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.407266] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.412529] RIP: 0033:0x413711 [ 429.415713] RSP: 002b:00007f5f7ecdca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 429.423494] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 429.431469] RDX: 00007f5f7ecdcb0a RSI: 0000000000000002 RDI: 00007f5f7ecdcb00 [ 429.438743] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 429.446289] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 429.453936] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff [ 429.461791] INFO: task blkid:14084 blocked for more than 140 seconds. [ 429.468371] Not tainted 4.14.135 #31 [ 429.472904] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.481089] blkid D28512 14084 8093 0x00000004 [ 429.486911] Call Trace: [ 429.489699] __schedule+0x7b8/0x1cd0 [ 429.493652] ? __mutex_lock+0x737/0x1470 [ 429.497719] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.502954] schedule+0x92/0x1c0 [ 429.506321] schedule_preempt_disabled+0x13/0x20 [ 429.511130] __mutex_lock+0x73c/0x1470 [ 429.515150] ? blkdev_put+0x2b/0x510 [ 429.519048] ? mutex_trylock+0x1c0/0x1c0 [ 429.523722] ? fsnotify+0x92f/0x11e0 [ 429.527444] ? blkdev_put+0x510/0x510 [ 429.531288] mutex_lock_nested+0x16/0x20 [ 429.535568] ? mutex_lock_nested+0x16/0x20 [ 429.540271] blkdev_put+0x2b/0x510 [ 429.544104] ? fcntl_setlk+0xb90/0xb90 [ 429.547987] ? blkdev_put+0x510/0x510 [ 429.552199] blkdev_close+0x8b/0xb0 [ 429.555910] __fput+0x275/0x7a0 [ 429.559288] ____fput+0x16/0x20 [ 429.562833] task_work_run+0x114/0x190 [ 429.566952] exit_to_usermode_loop+0x1da/0x220 [ 429.571719] do_syscall_64+0x4bc/0x640 [ 429.575608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.580518] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.585862] RIP: 0033:0x7fe9377682b0 [ 429.589715] RSP: 002b:00007ffe92792288 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 429.597505] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe9377682b0 [ 429.604983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 429.612395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 429.620268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001c8c030 [ 429.627791] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 429.635367] INFO: task blkid:14085 blocked for more than 140 seconds. [ 429.641984] Not tainted 4.14.135 #31 [ 429.646474] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.655043] blkid D29040 14085 7387 0x00000004 [ 429.660711] Call Trace: [ 429.663297] __schedule+0x7b8/0x1cd0 [ 429.667370] ? __mutex_lock+0x737/0x1470 [ 429.671512] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.676628] schedule+0x92/0x1c0 [ 429.679990] schedule_preempt_disabled+0x13/0x20 [ 429.684983] __mutex_lock+0x73c/0x1470 [ 429.689107] ? lo_open+0x1d/0xb0 [ 429.692541] ? refcount_inc_not_zero+0x80/0xe0 [ 429.697536] ? mutex_trylock+0x1c0/0x1c0 [ 429.701687] ? exact_match+0xd/0x20 [ 429.705474] ? kobj_lookup+0x314/0x400 [ 429.709362] ? loop_unregister_transfer+0x90/0x90 [ 429.714481] mutex_lock_nested+0x16/0x20 [ 429.718674] ? mutex_lock_nested+0x16/0x20 [ 429.723133] lo_open+0x1d/0xb0 [ 429.726413] __blkdev_get+0xaad/0x1120 [ 429.730549] ? __blkdev_put+0x7f0/0x7f0 [ 429.734618] ? bd_acquire+0x178/0x2c0 [ 429.738521] ? find_held_lock+0x35/0x130 [ 429.742673] blkdev_get+0xa8/0x8e0 [ 429.746401] ? bd_may_claim+0xd0/0xd0 [ 429.750447] ? _raw_spin_unlock+0x2d/0x50 [ 429.754760] blkdev_open+0x1d1/0x260 [ 429.758474] ? security_file_open+0x89/0x190 [ 429.763165] do_dentry_open+0x73b/0xeb0 [ 429.767387] ? bd_acquire+0x2c0/0x2c0 [ 429.771306] vfs_open+0x105/0x220 [ 429.774760] path_openat+0x8bd/0x3f70 [ 429.778557] ? trace_hardirqs_on+0x10/0x10 [ 429.783238] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 429.787920] ? find_held_lock+0x35/0x130 [ 429.792054] ? __alloc_fd+0x1d4/0x4a0 [ 429.795993] do_filp_open+0x18e/0x250 [ 429.799810] ? may_open_dev+0xe0/0xe0 [ 429.803711] ? _raw_spin_unlock+0x2d/0x50 [ 429.807867] ? __alloc_fd+0x1d4/0x4a0 [ 429.811887] do_sys_open+0x2c5/0x430 [ 429.815701] ? filp_open+0x70/0x70 [ 429.819252] SyS_open+0x2d/0x40 [ 429.822606] ? do_sys_open+0x430/0x430 [ 429.826608] do_syscall_64+0x1e8/0x640 [ 429.830581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.835442] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.840729] RIP: 0033:0x7f7e7a7fa120 [ 429.844439] RSP: 002b:00007ffc2e6400d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 429.852529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7e7a7fa120 [ 429.860106] RDX: 00007ffc2e640f41 RSI: 0000000000000000 RDI: 00007ffc2e640f41 [ 429.867687] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 429.875283] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000239c030 [ 429.882687] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 429.889967] INFO: task syz-executor.3:14091 blocked for more than 140 seconds. [ 429.897816] Not tainted 4.14.135 #31 [ 429.902267] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.910705] syz-executor.3 D29696 14091 6882 0x00000004 [ 429.916344] Call Trace: [ 429.919178] __schedule+0x7b8/0x1cd0 [ 429.923092] ? __mutex_lock+0x737/0x1470 [ 429.927336] ? pci_mmcfg_check_reserved+0x150/0x150 [ 429.932425] schedule+0x92/0x1c0 [ 429.935789] schedule_preempt_disabled+0x13/0x20 [ 429.940947] __mutex_lock+0x73c/0x1470 [ 429.944976] ? loop_control_ioctl+0x65/0x2f0 [ 429.949788] ? mutex_trylock+0x1c0/0x1c0 [ 429.953943] ? trace_hardirqs_on+0x10/0x10 [ 429.958274] ? __might_fault+0x110/0x1d0 [ 429.962615] mutex_lock_nested+0x16/0x20 [ 429.967041] ? mutex_lock_nested+0x16/0x20 [ 429.971388] loop_control_ioctl+0x65/0x2f0 [ 429.975626] ? loop_add+0x850/0x850 [ 429.979254] ? loop_add+0x850/0x850 [ 429.982944] do_vfs_ioctl+0x7ae/0x1060 [ 429.986828] ? selinux_file_mprotect+0x5d0/0x5d0 [ 429.991857] ? lock_downgrade+0x6e0/0x6e0 [ 429.996373] ? ioctl_preallocate+0x1c0/0x1c0 [ 430.001044] ? __fget+0x237/0x370 [ 430.004637] ? security_file_ioctl+0x89/0xb0 [ 430.009211] SyS_ioctl+0x8f/0xc0 [ 430.012652] ? do_vfs_ioctl+0x1060/0x1060 [ 430.016798] do_syscall_64+0x1e8/0x640 [ 430.020914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.025893] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.031153] RIP: 0033:0x459829 [ 430.034338] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 430.042582] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 430.049846] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 430.057350] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 430.072261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4 [ 430.079698] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 00000000ffffffff [ 430.087126] INFO: task syz-executor.3:14099 blocked for more than 140 seconds. [ 430.095146] Not tainted 4.14.135 #31 [ 430.099661] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 430.108370] syz-executor.3 D30176 14099 6882 0x00000004 [ 430.114058] Call Trace: [ 430.116990] __schedule+0x7b8/0x1cd0 [ 430.120796] ? __mutex_lock+0x737/0x1470 [ 430.124987] ? pci_mmcfg_check_reserved+0x150/0x150 [ 430.130324] schedule+0x92/0x1c0 [ 430.133690] schedule_preempt_disabled+0x13/0x20 [ 430.138647] __mutex_lock+0x73c/0x1470 [ 430.142696] ? loop_control_ioctl+0x65/0x2f0 [ 430.147340] ? mutex_trylock+0x1c0/0x1c0 [ 430.151578] ? trace_hardirqs_on+0x10/0x10 [ 430.155934] ? __might_fault+0x110/0x1d0 [ 430.160368] mutex_lock_nested+0x16/0x20 [ 430.164427] ? mutex_lock_nested+0x16/0x20 [ 430.169015] loop_control_ioctl+0x65/0x2f0 [ 430.173973] ? loop_add+0x850/0x850 [ 430.177595] ? loop_add+0x850/0x850 [ 430.181596] do_vfs_ioctl+0x7ae/0x1060 [ 430.185487] ? selinux_file_mprotect+0x5d0/0x5d0 [ 430.190675] ? lock_downgrade+0x6e0/0x6e0 [ 430.194835] ? ioctl_preallocate+0x1c0/0x1c0 [ 430.199241] ? __fget+0x237/0x370 [ 430.202773] ? security_file_ioctl+0x89/0xb0 [ 430.207621] SyS_ioctl+0x8f/0xc0 [ 430.211098] ? do_vfs_ioctl+0x1060/0x1060 [ 430.215252] do_syscall_64+0x1e8/0x640 [ 430.219137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.224187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.229884] RIP: 0033:0x459829 [ 430.233163] RSP: 002b:00007f560fa1dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 430.241099] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 430.248554] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000005 [ 430.256173] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 430.263580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa1e6d4 [ 430.271427] R13: 00000000004c2f72 R14: 00000000004d65b8 R15: 00000000ffffffff [ 430.279034] [ 430.279034] Showing all locks held in the system: [ 430.285777] 1 lock held by khungtaskd/1012: [ 430.290541] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 430.299923] 1 lock held by rsyslogd/6709: [ 430.304177] #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0xab/0xd0 [ 430.313316] 2 locks held by getty/6831: [ 430.317519] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.326434] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.336176] 2 locks held by getty/6832: [ 430.340371] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.349550] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.359316] 2 locks held by getty/6833: [ 430.363441] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.372507] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.382298] 2 locks held by getty/6834: [ 430.386264] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.395259] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.405020] 2 locks held by getty/6835: [ 430.409488] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.418281] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.428084] 2 locks held by getty/6836: [ 430.432303] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.441410] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.451148] 2 locks held by getty/6837: [ 430.455266] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 430.464300] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 430.473881] 2 locks held by syz-executor.5/14048: [ 430.478717] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 430.487904] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x20/0x1b0 [ 430.496643] 2 locks held by syz-executor.4/14081: [ 430.501534] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 430.511211] #1: (&lo->lo_ctl_mutex#2){+.+.}, at: [] loop_control_ioctl+0x153/0x2f0 [ 430.520744] 1 lock held by syz-executor.0/14075: [ 430.525596] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 430.534513] 2 locks held by syz-executor.0/14079: [ 430.539352] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x8f/0x1ce0 [ 430.548499] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 430.557701] 1 lock held by syz-executor.1/14086: [ 430.562782] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 430.571788] 2 locks held by syz-executor.1/14094: [ 430.576629] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 430.585818] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 430.594283] 1 lock held by blkid/14084: [ 430.598270] #0: (&bdev->bd_mutex){+.+.}, at: [] blkdev_put+0x2b/0x510 [ 430.606853] 2 locks held by blkid/14085: [ 430.610942] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 430.619735] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 430.627849] 1 lock held by syz-executor.3/14091: [ 430.632622] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 430.641793] 1 lock held by syz-executor.3/14099: [ 430.646544] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 430.655811] 1 lock held by syz-executor.3/14102: [ 430.660741] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 430.670065] 1 lock held by syz-executor.3/14116: [ 430.674911] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x65/0x2f0 [ 430.684379] 1 lock held by blkid/14097: [ 430.688355] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 430.697225] [ 430.698860] ============================================= [ 430.698860] [ 430.706572] NMI backtrace for cpu 1 [ 430.710254] CPU: 1 PID: 1012 Comm: khungtaskd Not tainted 4.14.135 #31 [ 430.716923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.726555] Call Trace: [ 430.729154] dump_stack+0x138/0x19c [ 430.732803] nmi_cpu_backtrace.cold+0x57/0x94 [ 430.737609] ? irq_force_complete_move.cold+0x7d/0x7d [ 430.742811] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 430.748102] arch_trigger_cpumask_backtrace+0x14/0x20 [ 430.753308] watchdog+0x5e7/0xb90 [ 430.756776] kthread+0x319/0x430 [ 430.760283] ? hungtask_pm_notify+0x50/0x50 [ 430.764614] ? kthread_create_on_node+0xd0/0xd0 [ 430.769293] ret_from_fork+0x24/0x30 [ 430.773103] Sending NMI from CPU 1 to CPUs 0: [ 430.777831] NMI backtrace for cpu 0 [ 430.777834] CPU: 0 PID: 6871 Comm: syz-fuzzer Not tainted 4.14.135 #31 [ 430.777838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.777840] task: ffff8880a62e2000 task.stack: ffff8880a4cd0000 [ 430.777842] RIP: 0033:0x41d493 [ 430.777844] RSP: 002b:000000c420357e90 EFLAGS: 00000293 [ 430.777848] RAX: 000000c420000000 RBX: 000000c41fcc1bff RCX: 0000000000000000 [ 430.777851] RDX: 000000c43c280000 RSI: 000000c4267c8000 RDI: 0000000000000000 [ 430.777854] RBP: 000000c420357f28 R08: 0000000000000000 R09: 000000000107b3c0 [ 430.777856] R10: 0000000000000040 R11: 000000c4259bde60 R12: 000000c42779a800 [ 430.777859] R13: 0000000000000079 R14: 0000000000000000 R15: 0000000000000000 [ 430.777861] FS: 000000c4202b5890(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 430.777864] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.777866] CR2: 000000c436751010 CR3: 00000000832c8000 CR4: 00000000001406f0 [ 430.777869] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 430.777871] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 430.779207] Kernel panic - not syncing: hung_task: blocked tasks [ 430.891784] CPU: 1 PID: 1012 Comm: khungtaskd Not tainted 4.14.135 #31 [ 430.898623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.907985] Call Trace: [ 430.910589] dump_stack+0x138/0x19c [ 430.914225] panic+0x1f2/0x426 [ 430.917586] ? add_taint.cold+0x16/0x16 [ 430.921567] ? ___preempt_schedule+0x16/0x18 [ 430.926079] watchdog+0x5f8/0xb90 [ 430.929719] kthread+0x319/0x430 [ 430.933092] ? hungtask_pm_notify+0x50/0x50 [ 430.937579] ? kthread_create_on_node+0xd0/0xd0 [ 430.942395] ret_from_fork+0x24/0x30 [ 430.947797] Kernel Offset: disabled [ 430.951454] Rebooting in 86400 seconds..