24b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:08 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) lseek(r0, 0x0, 0x4) getdents(r0, &(0x7f00000010c0)=""/4096, 0x1000) 23:07:08 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:08 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff002500006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f125000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:08 executing program 5: socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001740)=""/102400}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x10, 0x2, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) [ 731.760997][T14897] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 731.784905][T14898] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 731.833455][T14912] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f225000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f325000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:09 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f425000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 732.186069][ T4285] Dev loop3: unable to read RDB block 8 [ 732.196460][ T4285] loop3: unable to read partition table [ 732.210334][ T4285] loop3: partition table beyond EOD, truncated [ 732.516533][T14910] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 732.723583][ T4285] Dev loop3: unable to read RDB block 8 [ 732.729939][ T4285] loop3: unable to read partition table [ 732.735661][ T4285] loop3: partition table beyond EOD, truncated [ 733.111892][T14976] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:10 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f525000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:10 executing program 5: socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001740)=""/102400}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 23:07:10 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:10 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000008006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:10 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 733.660550][T14990] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f625000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 733.710550][T14991] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f725000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000001500), 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000230000000000020000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000002300000000000000000000000073797a3000000000000000020000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000073797a3100f8000000000000ffff00000000000005000000000000000000000000000000000000f6e40000cf320000000000000000000000000100000000000001000000000000000000000000000000000000003cfd0602c5fe4fd513d48ffdcb170d11c280de9e44fd01b16e71031f81f56f6eeb47ea9740870df3b34f79c845f182f30d14fecf19f44ea90ff5d96b8281fe492ab12160d46d76f11b73da8e8bee622c883f6e595c7c9f25d5d4a1e7d55b356353028b7f9e6f503b735f3078f621c4fe4e4a6b77183bc9114b28db6c0ad13390dbc4ba4612d8367322160b09f353a6346569ce12f845a54950507a72187a7c663241c23eac44a8729a648b2722088eb3e23146ebf3c723eceb65053c72beaae824fdad06a1131b684056b3f23f327dd47384028b74d7f90fa5cb1d77d0dc7a059e110ffc7a79e4e94561f0244c7ee0d1376014084570c4c9c64378a55fc4180cd9009bd275d54018b17c47afc54adc8bbd62f4a534642fc0bcbc961c971b16e110d003a401c80b9ceed495054d748edbb0e2485321e17a47f5d8a1552992407098abb20178bbd5e99a4dcc5f5e66aab20a3d835e7d8ccf4eab65993fe38315f1668f4ca70eccb582fea38a1e2b5b79e254e28993dec9bd8ec20000000000f5e9652260e4cf32c5d1602873a8f23d7ff82f8bf14ad06ad770618b618d4f90be832928deae5af302f17c245dab250c04546746f19e0187b7eae88de9c1c0d2c35c26470e4139e84485519dbf5b8fccf0e10f66a2c86883"], 0x119) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x2}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x800}}, 0x10) 23:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f825000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202f925000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202fa25000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 734.318336][T15011] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 734.394767][ T4285] Dev loop3: unable to read RDB block 8 [ 734.405835][ T4285] loop3: unable to read partition table [ 734.415541][ T4285] loop3: partition table beyond EOD, truncated 23:07:12 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000001500), 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x119) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x2}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x800}}, 0x10) 23:07:12 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202fb25000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:12 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:12 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 735.331433][T15074] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:12 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 735.381610][T15086] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202fc25000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:12 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 735.485563][ T4285] Dev loop3: unable to read RDB block 8 [ 735.506011][ T4285] loop3: unable to read partition table [ 735.519911][ T4285] loop3: partition table beyond EOD, truncated 23:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202fd25000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202fe25000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202003f000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 736.112550][T15084] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 736.183990][ T4285] Dev loop3: unable to read RDB block 8 [ 736.202952][ T4285] loop3: unable to read partition table [ 736.233026][ T4285] loop3: partition table beyond EOD, truncated [ 736.769223][T15084] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 736.856787][T15098] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:13 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020040000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:13 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) write$UHID_CREATE2(r4, &(0x7f0000001200)=ANY=[], 0x0) write$P9_RLOCK(r4, &(0x7f0000000240)={0x8, 0x35, 0x0, 0x2}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10002) 23:07:13 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:14 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 737.055097][T15180] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 737.067679][T15181] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020010000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:14 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x119) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) [ 737.422269][ T4285] Dev loop3: unable to read RDB block 8 [ 737.434903][ T4285] loop3: unable to read partition table 23:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x119) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) 23:07:14 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 737.462823][ T4285] loop3: partition table beyond EOD, truncated [ 737.507310][T15201] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x119) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r1}}, 0x48) [ 737.917172][ T4285] Dev loop3: unable to read RDB block 8 [ 737.929523][ T4285] loop3: unable to read partition table [ 737.943069][ T4285] loop3: partition table beyond EOD, truncated 23:07:15 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300105dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2d, &(0x7f000002eff0)={0x0, 0x0}, 0x10) clock_gettime(0x0, 0x0) 23:07:15 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000335d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:15 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:15 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 738.690890][T15277] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 23:07:15 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 738.908644][T15287] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 738.960738][T15313] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:07:16 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 739.103308][ T4285] Dev loop3: unable to read RDB block 8 [ 739.110078][ T4285] loop3: unable to read partition table [ 739.116209][ T4285] loop3: partition table beyond EOD, truncated [ 739.245510][ T4285] Dev loop3: unable to read RDB block 8 [ 739.263580][ T4285] loop3: unable to read partition table [ 739.293216][ T4285] loop3: partition table beyond EOD, truncated [ 739.486449][T15289] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 739.504140][T15295] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:16 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 739.597753][ T4285] Dev loop3: unable to read RDB block 8 [ 739.619099][ T4285] loop3: unable to read partition table [ 739.624836][ T4285] loop3: partition table beyond EOD, truncated 23:07:17 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 740.072163][T15287] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:07:17 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 740.143863][ T4285] Dev loop3: unable to read RDB block 8 [ 740.188389][ T4285] loop3: unable to read partition table [ 740.194132][ T4285] loop3: partition table beyond EOD, truncated [ 740.272095][T15368] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 740.302285][T15295] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:17 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000001500), 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x21a01) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) 23:07:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025020535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:17 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:17 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025030535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 741.020800][T15414] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:18 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 741.085685][T15426] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 741.219345][T15438] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 741.233598][T15418] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025040535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) write$UHID_CREATE2(r4, &(0x7f0000001200)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000230000000000020000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000002300000000000000000000000073797a3000000000000000020000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000073797a3100f8000000000000ffff00000000000005000000000000000000000000000000000000f6e40000cf320000000000000000000000000100000000000001000000000000000000000000000000000000003cfd0602c5fe4fd513d48ffdcb170d11c280de9e44fd01b16e71031f81f56f6eeb47ea9740870df3b34f79c845f182f30d14fecf19f44ea90ff5d96b8281fe492ab12160d46d76f11b73da8e8bee622c883f6e595c7c9f25d5d4a1e7d55b356353028b7f9e6f503b735f3078f621c4fe4e4a6b77183bc9114b28db6c0ad13390dbc4ba4612d8367322160b09f353a6346569ce12f845a54950507a72187a7c663241c23eac44a8729a648b2722088eb3e23146ebf3c723eceb65053c72beaae824fdad06a1131b684056b3f23f327dd47384028b74d7f90fa5cb1d77d0dc7a059e110ffc7a79e4e94561f0244c7ee0d1376014084570c4c9c64378a55fc4180cd9009bd275d54018b17c47afc54adc8bbd62f4a534642fc0bcbc961c971b16e110d003a401c80b9ceed495054d748edbb0e2485321e17a47f5d8a1552992407098abb20178bbd5e99a4dcc5f5e66aab20a3d835e7d8ccf4eab65993fe3"], 0x1) read$FUSE(r4, &(0x7f0000000200), 0x1000) write$P9_RLOCK(r4, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x2}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x10002) 23:07:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025050535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:18 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2a4a756f3c1dbb23}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) write$UHID_CREATE2(r4, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x1) read$FUSE(r4, &(0x7f0000000200), 0x1000) write$P9_RLOCK(r4, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x2}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback}, {0x2, 0x0, 0xffffffc1, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x10002) [ 741.527595][ T4285] Dev loop3: unable to read RDB block 8 [ 741.543806][ T4285] loop3: unable to read partition table [ 741.566807][ T4285] loop3: partition table beyond EOD, truncated [ 742.114943][ T4285] Dev loop3: unable to read RDB block 8 [ 742.121187][ T4285] loop3: unable to read partition table [ 742.127040][ T4285] loop3: partition table beyond EOD, truncated [ 742.463836][T15433] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:19 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025060535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 23:07:19 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:19 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:19 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 742.664591][T15516] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025070535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025080535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025090535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:20 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 743.146791][ T4285] Dev loop3: unable to read RDB block 8 [ 743.163359][ T4285] loop3: unable to read partition table [ 743.185826][ T4285] loop3: partition table beyond EOD, truncated 23:07:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 743.610314][T15535] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 743.694655][ T4285] Dev loop3: unable to read RDB block 8 [ 743.700691][ T4285] loop3: unable to read partition table [ 743.707249][ T4285] loop3: partition table beyond EOD, truncated [ 743.970286][T15538] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:21 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 23:07:21 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:21 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:21 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 744.614971][T15613] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 744.655003][T15619] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200250f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025100535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:22 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:22 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000500)={@random="63e8d985f6da", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x10, 0x3a, 0x0, @remote, @mcast2, {[], @ni}}}}}, 0x0) [ 745.257735][ T4285] Dev loop3: unable to read RDB block 8 [ 745.259253][T15625] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 745.266913][ T4285] loop3: unable to read partition table [ 745.295953][ T4285] loop3: partition table beyond EOD, truncated [ 745.816978][ T4285] Dev loop3: unable to read RDB block 8 [ 745.832484][ T4285] loop3: unable to read partition table [ 745.843682][ T4285] loop3: partition table beyond EOD, truncated 23:07:23 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025110535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:23 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r5}, 0x14}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_TOS={0x5, 0x9, 0x4c}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e20}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e20}]}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:07:23 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:23 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 746.166007][T15703] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 746.455550][ T4285] Dev loop3: unable to read RDB block 8 [ 746.462404][ T4285] loop3: unable to read partition table [ 746.470607][ T4285] loop3: partition table beyond EOD, truncated 23:07:23 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025120535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:23 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) 23:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025130535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 746.923995][T15742] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:24 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8880fe800001000000000000000000000600ff02000000000000000000000000000101004e2000459078e29607149378d33e1db1c7b22ac77aa3f7fac33b042bd368236862531934ecb1c373f87429e50b3288d09ddf137e81aea56d86884b08d1b9baa36a1b513c2c28f0123c4516dac468ab7d2a55b03592a1b73e3d551df3387bb310cf05f5085b9d1db3f58e7aa5ede91f097534c377a5fcc96c93e186803d17a0744030117488600b3e72a2dfe202754fc5872baea9c91b60f08c7cb29b7e260c2d3ca873a6e274dd3c448a9a5c997bf802a14b385b1503a87b7402aaa98172db56a77b24aa29d6c4d443179bde2fe7440974db7d6a8e7a2055a1a4077fccbe3fa4156ae69c0eeec036acf9c86da2adea37b8d03c1b3be3ad58fafaa4f61043744843eb184f14953c68d5c9c287d54217f39ee7401fdf5ef5b34bfa1c02fea1365fd7c3b149485e058cecc094907916756d5a001518fae66f6a002a4ebe2337f2ef5d313c67b25ad1566f7c514174f8e4addc365d5206918952ca91a93320d5f392a8ce0b470492e56fc879f590560064f6c1e84b800f8084fcab85aefd243b393c68c3bac86ea84df99570f67f724a338ad00e187e83616f0e791c9b0923b9591bfc74a1595457db39d90e3940074cdb70c2292363d1cabddcf38476bb4aafe86358212edd0f4cac93c44a30da438790f41ef8b5cd563b38109d483efd0c48bf21daea6b3eeaf82b59940f475d5d455044ace9cab283e86378b552d6abf7a9f636776158000000000000000000000000000000402a418d31a0cdfb29d05981694ca43cb44290544249f6e21d282a174d9f7f84fea9c43e5587cab728b45bdeb57f6069033c9486d1ba6e63721607e26d2cc69b8b1234c37c362e3b72bdcc283d859dd12957ae84ae777058e15c4100000000000000007f6565a344df7006d342afed32055cb4ca54ff1b09f34b1ebb7713aca44c983f6ce5f160790c43000000000000000000000014f1f6c4a42c9a78ff438d3d909ddb8e084819d21a7772cfed8261f0582e8a1eacc5aa37293f1fa204a847d432a5bb9710af991e8bcf5a15b92c65befcb2687fc7dd236dd950e9b6c17814883085f0c5cecf8e9b835f000054bd83756e850c3b823372985846a9f54adb562f200d7ee67e2d5eda09f68cad63dcb7597a3d368bf14c12dec6113eca1cbb12456f6ea5f99b25af8000000000000000000000003e3c6a7eeeff3143c09d22493c70838db442c9ac5ae4f463bfbf3ad79f9cbc3be95f6c6ef391b7bef372326dccf34f183d69a8665f2eff3a074130b092422c753df6ff25eb431ca024370f3faeee613df9b5d3ade3b0f3278c8e8465b6964f939bab0d4544c26626628f6dc4aeb15e142ab1bf403fd61eba75e3d9df001dd2517a61564727442fc4938efcfd3960537eda2a534577acaa23283b42304c189a3270da8680cc6f8b5e11b95d4e6ec34f43bb7f8853ec9682498a04d464bb818772d08f428304a74e039b1afb14751cf44fafcf9a45b8dcc6db4726f76c8ff39632bfe42eded26da08337306b167c86748285d9d91c657f67b100acc0d7b7f3188f43719114dde6355bc9"], 0x0) 23:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025140535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 747.394350][ T4285] Dev loop3: unable to read RDB block 8 [ 747.411171][ T4285] loop3: unable to read partition table [ 747.416944][ T4285] loop3: partition table beyond EOD, truncated 23:07:24 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300485dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x0, 0x7, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x0, 0x0, 0x0, 0x1ff]}, 0x5c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x6, 0x0, 0x1ff]}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000640)={0x90, 0x0, 0x0, {0x0, 0x0, 0x9, 0x9, 0xd1, 0x7ff}}, 0x90) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @dev}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025150535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:24 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:24 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 747.779382][T15798] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 747.804337][T15796] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 748.184837][ T4285] Dev loop3: unable to read RDB block 8 [ 748.208127][ T4285] loop3: unable to read partition table [ 748.227225][ T4285] loop3: partition table beyond EOD, truncated [ 748.322037][T15738] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:25 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025160535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x103101, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0x5}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000100)={{0x5}}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x14, &(0x7f00000001c0)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000680)={r3, 0x5, 0x89, "32319315f92e3cc4ddc1b8d79a803d61d295b26a649237c244fea5d1d7d23df4a0dadc7aa3ebc6d0abbf775a8b2ea562cd6e5761b1f9680c8b968657daa16ec9302c53d15489102d63829afe35d022b94b7ec4d19f0085685fd78070c69704553e4a3aaaf69bbe6c0178560f089a2592185c2830454dfafb7dac12fc726a19a389825cf2a35a7caa07"}, 0x91) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0x2}, 'port1\x00', 0x48, 0x40, 0x1, 0xfff, 0x200, 0x4, 0x3, 0x0, 0x2, 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:25 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:25 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000025006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 748.665783][T15860] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 748.739633][T15870] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025170535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025180535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 749.204881][ T4285] Dev loop3: unable to read RDB block 8 [ 749.219208][ T4285] loop3: unable to read partition table [ 749.231629][ T4285] loop3: partition table beyond EOD, truncated 23:07:26 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) ioctl$USBDEVFS_SETINTERFACE(r0, 0x5522, 0x0) 23:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025190535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:26 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:26 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet(0x2, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 749.695476][T15913] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 750.032849][ T4285] Dev loop3: unable to read RDB block 8 [ 750.044438][ T4285] loop3: unable to read partition table [ 750.058424][ T4285] loop3: partition table beyond EOD, truncated 23:07:27 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200251a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:27 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:27 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:27 executing program 5: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet(0x2, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 750.499777][T15965] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 750.529673][T15971] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200251b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:27 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 750.706026][ T4285] Dev loop3: unable to read RDB block 8 [ 750.731590][ T4285] loop3: unable to read partition table [ 750.753007][ T4285] loop3: partition table beyond EOD, truncated [ 751.105340][ T4285] Dev loop3: unable to read RDB block 8 [ 751.112963][ T4285] loop3: unable to read partition table [ 751.121400][ T4285] loop3: partition table beyond EOD, truncated 23:07:28 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200251c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:28 executing program 5: syz_emit_ethernet(0xa2, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60209200006c3c00fe8000000000000000000000000000bbff020000000000000000000000000001290a040500000000fe88000000000000000000000000000100000000000000000000000000000000fe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000c382e01a6c6632", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0/', r0, &(0x7f0000d06ff8)='./file0\x00') mknod(&(0x7f0000000140)='./file0\x00', 0x8000, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0/', r1, &(0x7f0000d06ff8)='./file0\x00') openat(r1, &(0x7f00000000c0)='./file0/', 0x0, 0x0) faccessat(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x3) 23:07:28 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:28 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000048006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 751.641308][T16024] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 751.660834][T15984] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 751.673573][T16022] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 751.960852][ T4285] Dev loop3: unable to read RDB block 8 [ 751.966501][ T4285] loop3: unable to read partition table [ 751.975339][ T4285] loop3: partition table beyond EOD, truncated 23:07:29 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200251d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) 23:07:29 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:29 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200251e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 752.571690][T16073] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025210535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 752.901956][ T4285] Dev loop3: unable to read RDB block 8 [ 752.907908][ T4285] loop3: unable to read partition table [ 752.913848][ T4285] loop3: partition table beyond EOD, truncated 23:07:30 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300605dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025220535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:30 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x103101, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) sendmsg$IPSET_CMD_PROTOCOL(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b2ab804b38f9cac8fea1a8c4712b53306c00a649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f86005f85f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:30 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000060006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 753.482364][T16125] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 753.930177][ T4285] Dev loop3: unable to read RDB block 8 [ 753.936188][ T4285] loop3: unable to read partition table [ 753.944227][ T4285] loop3: partition table beyond EOD, truncated 23:07:31 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025230535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) 23:07:31 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 754.352133][T16179] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025240535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:31 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 754.423494][T16191] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:31 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x103101, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0x5}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000540)={{0x2}, 'port1\x00', 0x0, 0x40, 0x1, 0xfff, 0x200, 0x4, 0x3, 0x0, 0x0, 0x1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000780)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}}, 0x20000080) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 754.623715][T16199] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 754.680971][T16136] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 754.791456][ T4285] Dev loop3: unable to read RDB block 8 [ 754.808711][ T4285] loop3: unable to read partition table [ 754.844121][ T4285] loop3: partition table beyond EOD, truncated 23:07:32 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300685dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025250535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:32 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) dup2(r0, r1) 23:07:32 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 755.443711][T16243] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 755.528376][T16250] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 755.601534][T16256] netlink: 131070 bytes leftover after parsing attributes in process `syz-executor.1'. [ 755.803776][ T4285] Dev loop3: unable to read RDB block 8 [ 755.816681][ T4285] loop3: unable to read partition table [ 755.822448][ T4285] loop3: partition table beyond EOD, truncated 23:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025260535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) dup2(r0, r1) 23:07:33 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:33 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025270535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 756.359506][T16243] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e6e8287051d1229b94574e7825441222e81748b4ee09c0180b89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df5380f1b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79fa8a0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c0000003fa64bc93c027b41"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) dup2(r0, r1) 23:07:33 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 756.686362][T16286] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 756.784797][ T4285] Dev loop3: unable to read RDB block 8 [ 756.792036][ T4285] loop3: unable to read partition table [ 756.797977][ T4285] loop3: partition table beyond EOD, truncated 23:07:33 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0083006c5dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025280535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e6e8287051d1229b94574e7825441222e81748b4ee09c0180b89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df5380f1b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79fa8a0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c0000003fa64bc93c027b41"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) dup2(r0, r1) 23:07:33 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025290535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 757.101868][T16342] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 757.482256][ T4285] Dev loop3: unable to read RDB block 8 [ 757.492825][ T4285] loop3: unable to read partition table [ 757.531328][ T4285] loop3: partition table beyond EOD, truncated [ 757.655094][T16298] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:35 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:35 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:35 executing program 5: 23:07:35 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00007a006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:35 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300745dff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:35 executing program 5: [ 758.171575][T16412] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 758.187694][T16411] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:35 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 758.237652][T16425] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:35 executing program 5: 23:07:35 executing program 5: [ 758.411292][ T4285] Dev loop3: unable to read RDB block 8 [ 758.455065][ T4285] loop3: unable to read partition table [ 758.495078][ T4285] loop3: partition table beyond EOD, truncated [ 758.792262][T16413] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 758.823752][ T4285] Dev loop3: unable to read RDB block 8 [ 758.835996][ T4285] loop3: unable to read partition table [ 758.847124][ T4285] loop3: partition table beyond EOD, truncated [ 759.211363][T16412] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:36 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200252f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:36 executing program 5: 23:07:36 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:36 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 759.382146][T16424] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 759.535566][ T4285] Dev loop3: unable to read RDB block 8 [ 759.559137][T16517] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 759.562865][ T4285] loop3: unable to read partition table [ 759.578742][ T4285] loop3: partition table beyond EOD, truncated 23:07:36 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:36 executing program 5: 23:07:36 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025300535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025310535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:37 executing program 5: 23:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025320535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 760.489026][ T4285] Dev loop3: unable to read RDB block 8 [ 760.494629][ T4285] loop3: unable to read partition table [ 760.508871][ T4285] loop3: partition table beyond EOD, truncated 23:07:37 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:37 executing program 5: 23:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025330535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:37 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:37 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 760.795514][T16596] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 760.822097][T16601] __nla_validate_parse: 2 callbacks suppressed [ 760.822106][T16601] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 760.987932][ T4285] Dev loop3: unable to read RDB block 8 [ 760.993666][ T4285] loop3: unable to read partition table [ 761.008829][ T4285] loop3: partition table beyond EOD, truncated 23:07:38 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:38 executing program 5: 23:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025340535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:38 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:38 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:38 executing program 5: 23:07:38 executing program 5: [ 761.618365][T16646] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 762.087923][ T4285] Dev loop3: unable to read RDB block 8 [ 762.093587][ T4285] loop3: unable to read partition table [ 762.105434][ T4285] loop3: partition table beyond EOD, truncated 23:07:39 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00000b006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025350535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:39 executing program 5: 23:07:39 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:39 executing program 5: [ 762.470883][T16697] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 762.808751][ T4285] Dev loop3: unable to read RDB block 8 [ 762.814367][ T4285] loop3: unable to read partition table [ 762.823149][ T4285] loop3: partition table beyond EOD, truncated [ 763.307485][T16646] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:40 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0083000025ff000000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025360535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:40 executing program 5: 23:07:40 executing program 3: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:40 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:40 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:40 executing program 5: 23:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025370535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 763.753540][T16750] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:40 executing program 5: [ 763.876116][T16770] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025380535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:41 executing program 5: 23:07:41 executing program 5: [ 764.259419][ T4285] Dev loop3: unable to read RDB block 8 [ 764.265185][ T4285] loop3: unable to read partition table [ 764.273017][ T4285] loop3: partition table beyond EOD, truncated [ 764.400461][T16751] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 764.805743][T16750] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 764.961902][T16751] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:42 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025390535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:42 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:42 executing program 5: 23:07:42 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:42 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 765.366023][T16839] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:42 executing program 5: 23:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200253a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 765.486886][T16849] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:42 executing program 5: 23:07:42 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200253b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:42 executing program 5: [ 765.805006][ T4285] Dev loop3: unable to read RDB block 8 [ 765.834002][ T4285] loop3: unable to read partition table [ 765.865794][ T4285] loop3: partition table beyond EOD, truncated [ 766.147175][T16852] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 766.290472][ T4285] Dev loop3: unable to read RDB block 8 [ 766.301994][ T4285] loop3: unable to read partition table [ 766.314710][ T4285] loop3: partition table beyond EOD, truncated [ 766.631624][T16846] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:43 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff030000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:43 executing program 5: 23:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200253c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:43 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:43 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:43 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:44 executing program 5: 23:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200253d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 766.990609][T16945] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 767.011925][T16939] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 767.071983][T16957] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 767.074893][T16959] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200253e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:44 executing program 5: 23:07:44 executing program 5: 23:07:44 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 767.543643][ T4285] Dev loop3: unable to read RDB block 8 [ 767.553537][ T4285] loop3: unable to read partition table [ 767.564406][ T4285] loop3: partition table beyond EOD, truncated [ 767.823653][T16941] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 767.853957][ T4285] Dev loop3: unable to read RDB block 8 [ 767.870602][ T4285] loop3: unable to read partition table [ 767.878982][ T4285] loop3: partition table beyond EOD, truncated 23:07:45 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025410535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:45 executing program 5: 23:07:45 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:45 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 768.313816][T16941] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 768.723506][ T4285] Dev loop3: unable to read RDB block 8 [ 768.730720][ T4285] loop3: unable to read partition table [ 768.738106][ T4285] loop3: partition table beyond EOD, truncated [ 768.845538][T17021] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:46 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00800e006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:46 executing program 5: 23:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025420535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:46 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025430535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:46 executing program 5: [ 769.179852][T17077] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:46 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 769.354191][ T4285] Dev loop3: unable to read RDB block 8 [ 769.378308][ T4285] loop3: unable to read partition table [ 769.395636][ T4285] loop3: partition table beyond EOD, truncated [ 769.545577][ T4285] Dev loop3: unable to read RDB block 8 [ 769.555170][ T4285] loop3: unable to read partition table [ 769.562620][ T4285] loop3: partition table beyond EOD, truncated [ 769.996987][T17021] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:47 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff050000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025440535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:47 executing program 5: 23:07:47 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:47 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:47 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:47 executing program 5: [ 770.409523][T17134] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025450535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 770.484356][T17140] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 770.560773][T17152] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:47 executing program 5: 23:07:47 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025460535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:47 executing program 5: [ 770.766354][ T4285] Dev loop3: unable to read RDB block 8 [ 770.785905][ T4285] loop3: unable to read partition table [ 770.801991][ T4285] loop3: partition table beyond EOD, truncated [ 771.071699][T17139] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 771.510266][T17134] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 771.649829][T17139] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:48 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025470535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:48 executing program 5: 23:07:48 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:48 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:48 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000000a6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025480535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:49 executing program 5: [ 772.100206][T17233] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 772.125071][T17237] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:49 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025490535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:49 executing program 5: [ 772.297379][ T4285] Dev loop3: unable to read RDB block 8 [ 772.329674][ T4285] loop3: unable to read partition table [ 772.350421][ T4285] loop3: partition table beyond EOD, truncated 23:07:49 executing program 5: [ 772.712695][T17236] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 773.101838][T17237] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 773.198332][T17253] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:50 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff070000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:50 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:50 executing program 5: 23:07:50 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:50 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:50 executing program 5: 23:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 773.672155][T17325] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 773.816799][T17329] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 773.821764][T17345] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:50 executing program 5: [ 773.859359][T17328] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:50 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 774.134643][ T4285] Dev loop3: unable to read RDB block 8 [ 774.148359][ T4285] loop3: unable to read partition table [ 774.154605][ T4285] loop3: partition table beyond EOD, truncated [ 774.291596][ T4285] Dev loop3: unable to read RDB block 8 [ 774.303087][ T4285] loop3: unable to read partition table [ 774.315069][ T4285] loop3: partition table beyond EOD, truncated [ 774.737773][T17325] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 774.910912][T17345] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:52 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:52 executing program 5: 23:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:52 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:52 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000000c6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:52 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:52 executing program 5: 23:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200254f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 775.363155][T17406] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 775.374945][T17407] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 775.445477][T17420] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025500535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:52 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:52 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025510535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 775.607736][ T4285] Dev loop3: unable to read RDB block 8 [ 775.623101][ T4285] loop3: unable to read partition table [ 775.643494][ T4285] loop3: partition table beyond EOD, truncated [ 775.830876][ T4285] Dev loop3: unable to read RDB block 8 [ 775.852022][ T4285] loop3: unable to read partition table [ 775.870667][ T4285] loop3: partition table beyond EOD, truncated [ 776.034535][T17411] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 776.455569][T17407] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 776.693089][T17411] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:53 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:53 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:53 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025520535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:53 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:53 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 776.910267][T17516] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025530535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 776.957534][T17518] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:54 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 777.019260][T17527] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025540535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:54 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:54 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025550535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 777.289821][ T4285] Dev loop3: unable to read RDB block 8 [ 777.312589][ T4285] loop3: unable to read partition table [ 777.325490][ T4285] loop3: partition table beyond EOD, truncated [ 777.492642][ T4285] Dev loop3: unable to read RDB block 8 [ 777.499042][ T4285] loop3: unable to read partition table [ 777.504805][ T4285] loop3: partition table beyond EOD, truncated [ 777.654135][T17530] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:55 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:55 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025560535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:55 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:55 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 778.214779][T17536] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 778.279216][T17603] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 778.356461][T17611] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 778.420142][ T4285] Dev loop3: unable to read RDB block 8 [ 778.438255][ T4285] loop3: unable to read partition table [ 778.451358][ T4285] loop3: partition table beyond EOD, truncated 23:07:55 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025570535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:55 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:55 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025580535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:55 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:55 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000374000/0x3000)=nil, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 778.957766][T17655] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 779.014209][ T4285] Dev loop3: unable to read RDB block 8 [ 779.034427][ T4285] loop3: unable to read partition table [ 779.081308][ T4285] loop3: partition table beyond EOD, truncated [ 779.464124][T17607] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:56 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:56 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025590535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:56 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:56 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000800e6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:56 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 779.915828][T17706] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:07:56 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:57 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 780.002985][ T4285] Dev loop3: unable to read RDB block 8 [ 780.025750][T17730] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 780.046039][ T4285] loop3: unable to read partition table [ 780.065218][ T4285] loop3: partition table beyond EOD, truncated 23:07:57 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 780.132300][T17735] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:57 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 780.353959][ T4285] Dev loop3: unable to read RDB block 8 [ 780.364368][ T4285] loop3: unable to read partition table [ 780.381146][ T4285] loop3: partition table beyond EOD, truncated [ 780.541303][T17716] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 780.921336][T17706] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 781.071724][T17716] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:58 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:58 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:58 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:58 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:58 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 781.531913][T17803] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 781.532660][T17808] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:58 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 781.590608][T17815] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 781.636609][ T4285] Dev loop3: unable to read RDB block 8 [ 781.669406][ T4285] loop3: unable to read partition table 23:07:58 executing program 5: r0 = gettid() mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 781.688368][ T4285] loop3: partition table beyond EOD, truncated 23:07:58 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200255f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 782.108247][T17805] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 782.551170][T17815] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:07:59 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:07:59 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025600535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:07:59 executing program 5: r0 = gettid() mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:07:59 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:00 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:00 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 783.062145][T17880] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 783.078027][T17881] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:00 executing program 5: r0 = gettid() mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025610535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 783.132739][ T4285] Dev loop3: unable to read RDB block 8 [ 783.163299][ T4285] loop3: unable to read partition table [ 783.184871][ T4285] loop3: partition table beyond EOD, truncated 23:08:00 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025620535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:00 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 783.535489][ T4285] Dev loop3: unable to read RDB block 8 [ 783.545441][ T4285] loop3: unable to read partition table [ 783.558399][ T4285] loop3: partition table beyond EOD, truncated [ 783.663110][ T4285] Dev loop3: unable to read RDB block 8 [ 783.672835][ T4285] loop3: unable to read partition table [ 783.683126][ T4285] loop3: partition table beyond EOD, truncated [ 783.716984][T17903] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:01 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:01 executing program 5: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025630535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:01 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:01 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0e0000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 784.297682][T17903] net_ratelimit: 1 callbacks suppressed [ 784.297694][T17903] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 784.387432][T17961] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 784.427562][T17968] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 784.471123][ T4285] Dev loop3: unable to read RDB block 8 [ 784.478082][ T4285] loop3: unable to read partition table [ 784.484163][ T4285] loop3: partition table beyond EOD, truncated 23:08:01 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025640535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:01 executing program 5: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:01 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:01 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025650535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:01 executing program 5: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 784.969090][ T4285] Dev loop3: unable to read RDB block 8 [ 784.979993][T18004] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:02 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 785.009425][ T4285] loop3: unable to read partition table [ 785.031557][ T4285] loop3: partition table beyond EOD, truncated 23:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025660535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:02 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 785.353983][ T4285] Dev loop3: unable to read RDB block 8 [ 785.367953][ T4285] loop3: unable to read partition table [ 785.376121][ T4285] loop3: partition table beyond EOD, truncated [ 785.583360][T17961] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:02 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000256061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 785.825625][T17999] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 785.839067][T18053] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:03 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 786.203789][T18073] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 786.271923][T18082] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:03 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000060006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025670535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:03 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:03 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:03 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:03 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025680535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:03 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025690535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 786.549884][T18109] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 786.584897][ T4285] Dev loop3: unable to read RDB block 8 23:08:03 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x46, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 786.619772][ T4285] loop3: unable to read partition table [ 786.655825][ T4285] loop3: partition table beyond EOD, truncated 23:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 786.972405][ T4285] Dev loop3: unable to read RDB block 8 [ 786.978810][ T4285] loop3: unable to read partition table [ 786.984558][ T4285] loop3: partition table beyond EOD, truncated 23:08:04 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff110000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 787.312619][T18156] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 787.379579][T18164] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 787.469143][T18104] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:04 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:04 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:04 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x46, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:04 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 787.736159][T18164] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 787.736646][T18195] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:04 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:04 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x46, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:04 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 788.047630][ T4285] Dev loop3: unable to read RDB block 8 [ 788.068397][ T4285] loop3: unable to read partition table [ 788.089773][ T4285] loop3: partition table beyond EOD, truncated [ 788.299118][ T4285] Dev loop3: unable to read RDB block 8 [ 788.306236][ T4285] loop3: unable to read partition table [ 788.312681][ T4285] loop3: partition table beyond EOD, truncated [ 788.351871][T18204] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:05 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff120000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 788.828896][T18258] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 788.901410][T18266] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 788.938810][T18204] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:06 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00006c006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200256f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4b, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:06 executing program 5: gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:06 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:06 executing program 5: gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) [ 789.208022][T18302] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:06 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4b, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025700535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:06 executing program 5: gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4b, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025710535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 789.414382][ T4285] Dev loop3: unable to read RDB block 8 [ 789.440005][ T4285] loop3: unable to read partition table [ 789.491204][ T4285] loop3: partition table beyond EOD, truncated [ 789.624002][ T4285] Dev loop3: unable to read RDB block 8 [ 789.629884][ T4285] loop3: unable to read partition table [ 789.643494][ T4285] loop3: partition table beyond EOD, truncated 23:08:07 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 790.138469][T18355] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 790.199043][T18363] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 790.247258][T18312] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:07 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:07 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, 0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025720535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:07 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4d, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:07 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:07 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff3c0000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025730535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 790.800344][T18404] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:07 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, 0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:07 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4d, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 790.913158][T18424] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:07 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, 0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:08 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4d, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025740535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 791.069068][ T4285] Dev loop3: unable to read RDB block 8 [ 791.117124][ T4285] loop3: unable to read partition table [ 791.142705][ T4285] loop3: partition table beyond EOD, truncated [ 791.232680][ T4285] Dev loop3: unable to read RDB block 8 [ 791.260871][ T4285] loop3: unable to read partition table [ 791.279544][ T4285] loop3: partition table beyond EOD, truncated 23:08:08 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00007a006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:08 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025750535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:08 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:08 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:08 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff480000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:09 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) [ 792.036744][T18479] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025760535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:09 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:09 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) [ 792.201614][ T4285] Dev loop3: unable to read RDB block 8 [ 792.215641][ T4285] loop3: unable to read partition table [ 792.231831][ T4285] loop3: partition table beyond EOD, truncated 23:08:09 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:09 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 792.428894][ T4285] Dev loop3: unable to read RDB block 8 [ 792.444015][ T4285] loop3: unable to read partition table [ 792.451945][ T4285] loop3: partition table beyond EOD, truncated [ 792.562439][T18487] __nla_validate_parse: 2 callbacks suppressed [ 792.562448][T18487] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 793.038949][T18494] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:10 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025770535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:10 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:10 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:10 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:10 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff4c0000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:10 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 23:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025780535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 793.603828][T18578] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 793.611958][T18579] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:10 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:10 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) 23:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025790535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:10 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4f, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 793.825404][ T4285] Dev loop3: unable to read RDB block 8 [ 793.853108][ T4285] loop3: unable to read partition table [ 793.874819][ T4285] loop3: partition table beyond EOD, truncated [ 793.955455][ T4285] Dev loop3: unable to read RDB block 8 [ 793.961074][ T4285] loop3: unable to read partition table [ 793.970188][ T4285] loop3: partition table beyond EOD, truncated [ 794.010185][ T4285] Dev loop3: unable to read RDB block 8 [ 794.019259][ T4285] loop3: unable to read partition table [ 794.025766][ T4285] loop3: partition table beyond EOD, truncated [ 794.140072][T18583] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200257a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:11 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) 23:08:11 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:11 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:11 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0003e8006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:11 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff5b0000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:12 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) [ 795.020597][T18656] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200257b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:12 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:12 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0), 0x0, 0x0) [ 795.157943][T18678] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 795.160831][T18676] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:12 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a64"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 795.225252][T18674] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 795.277204][T18680] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200257c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:12 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 23:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200257d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:12 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 795.374697][ T4285] Dev loop3: unable to read RDB block 8 [ 795.420276][ T4285] loop3: unable to read partition table [ 795.440247][ T4285] loop3: partition table beyond EOD, truncated 23:08:13 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 796.081582][T18735] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 796.088241][T18656] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 796.103460][T18678] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:13 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 796.459674][T18761] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 796.533184][T18769] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:13 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:13 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 23:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200257e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:13 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:13 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025820535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 796.862984][T18786] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:13 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:13 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) [ 796.907405][T18787] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025830535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:14 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) [ 796.969881][ T4285] Dev loop3: unable to read RDB block 8 [ 797.002312][ T4285] loop3: unable to read partition table [ 797.033849][ T4285] loop3: partition table beyond EOD, truncated 23:08:14 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 797.479013][T18797] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:14 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 797.781170][T18852] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 797.872651][T18860] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 797.911938][T18786] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:15 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:15 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) 23:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025840535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:15 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:15 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in=@broadcast, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) 23:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025850535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 798.334122][T18883] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 798.334886][T18886] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:15 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025860535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 798.458569][T18897] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:15 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 798.531237][ T4285] Dev loop3: unable to read RDB block 8 [ 798.563584][ T4285] loop3: unable to read partition table [ 798.606854][ T4285] loop3: partition table beyond EOD, truncated 23:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025870535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:16 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 799.213567][T18952] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 799.295548][T18960] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:16 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:16 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:16 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 23:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025880535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:16 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025890535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:16 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 799.940493][T18988] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 799.969387][ T4285] Dev loop3: unable to read RDB block 8 [ 799.981894][ T4285] loop3: unable to read partition table [ 799.997804][ T4285] loop3: partition table beyond EOD, truncated 23:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:17 executing program 5: getxattr(0x0, &(0x7f00000001c0)=@known='com.apple.FinderInfo\x00', 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x5ec, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0x20}, 0xc) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0xffffffa8) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) 23:08:17 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 800.287932][ T4285] Dev loop3: unable to read RDB block 8 [ 800.312088][ T4285] loop3: unable to read partition table [ 800.348920][ T4285] loop3: partition table beyond EOD, truncated 23:08:17 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 800.531661][T19036] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 800.968291][T19003] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:18 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff740000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:18 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') sendfile(r0, r1, 0x0, 0x320f) 23:08:18 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000003e86061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 801.122974][T19080] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000), 0x4) 23:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 801.191447][T19084] net_ratelimit: 2 callbacks suppressed [ 801.191458][T19084] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 801.209042][T19050] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 801.257933][T19098] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:18 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file1\x00', 0xfffffd, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x24, r3, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x24}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0xc4, 0x0, 0x100, 0x0, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcc22}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0xc4}}, 0x8000) 23:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:18 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 801.418741][ T4285] Dev loop3: unable to read RDB block 8 [ 801.431498][ T4285] loop3: unable to read partition table [ 801.451026][ T4285] loop3: partition table beyond EOD, truncated [ 801.589102][T19111] XFS (loop5): Invalid superblock magic number [ 801.738670][ T4285] Dev loop3: unable to read RDB block 8 [ 801.753152][ T4285] loop3: unable to read partition table [ 801.760911][ T4285] loop3: partition table beyond EOD, truncated [ 801.884240][ T4285] Dev loop3: unable to read RDB block 8 [ 801.891272][ T4285] loop3: unable to read partition table [ 801.907037][ T4285] loop3: partition table beyond EOD, truncated [ 801.958066][T19036] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:19 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 802.283296][T19166] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.402202][T19091] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:19 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:19 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 23:08:19 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000e0ff6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 802.820011][T19193] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025900535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 802.883040][T19198] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:19 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 802.968154][ T4285] Dev loop3: unable to read RDB block 8 [ 802.976299][ T4285] loop3: unable to read partition table [ 802.982174][ T4285] loop3: partition table beyond EOD, truncated 23:08:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 23:08:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025910535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:20 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 803.387263][ T4285] Dev loop3: unable to read RDB block 8 [ 803.413295][ T4285] loop3: unable to read partition table [ 803.438860][ T4285] loop3: partition table beyond EOD, truncated 23:08:20 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000007006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 803.883496][T19260] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 803.950798][T19268] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 804.135538][T19208] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 804.140388][T19198] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:21 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000300006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025920535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 23:08:21 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:21 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:21 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000008006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025930535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 804.562518][T19304] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:21 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 804.755577][T19327] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 804.769775][T19315] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025940535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:21 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025950535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 804.929798][ T4285] Dev loop3: unable to read RDB block 8 [ 804.943279][ T4285] loop3: unable to read partition table [ 804.994391][ T4285] loop3: partition table beyond EOD, truncated [ 805.152165][ T4285] Dev loop3: unable to read RDB block 8 [ 805.158563][ T4285] loop3: unable to read partition table [ 805.173804][ T4285] loop3: partition table beyond EOD, truncated 23:08:22 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 23:08:22 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025960535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:22 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000009006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:22 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025970535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 805.844632][T19382] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:22 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 23:08:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025980535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 805.917168][T19393] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 805.976908][ T4285] Dev loop3: unable to read RDB block 8 [ 805.994072][ T4285] loop3: unable to read partition table [ 806.003089][T19408] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 806.012400][ T4285] loop3: partition table beyond EOD, truncated 23:08:23 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) [ 806.201845][T19389] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 806.261548][ T4285] Dev loop3: unable to read RDB block 8 [ 806.268717][ T4285] loop3: unable to read partition table [ 806.276263][ T4285] loop3: partition table beyond EOD, truncated 23:08:24 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025990535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:24 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 23:08:24 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:24 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000046061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259a0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 807.140609][T19463] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) [ 807.200424][T19469] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:24 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259b0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 23:08:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259c0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 807.431140][T19481] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 807.508869][T19486] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 807.538961][ T4285] Dev loop3: unable to read RDB block 8 [ 807.551836][ T4285] loop3: unable to read partition table [ 807.559865][ T4285] loop3: partition table beyond EOD, truncated [ 808.143653][T19463] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:25 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:25 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x7, 0x0, &(0x7f0000000280)="b95b03b7000300", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:25 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259d0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 808.588202][T19545] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:25 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00000b006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:25 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000056061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:25 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259e0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:25 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x7, 0x0, &(0x7f0000000280)="b95b03b7000300", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 808.717093][T19553] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 808.740044][ T4285] Dev loop3: unable to read RDB block 8 [ 808.769558][ T4285] loop3: unable to read partition table 23:08:25 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:25 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x7, 0x0, &(0x7f0000000280)="b95b03b7000300", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 808.815292][ T4285] loop3: partition table beyond EOD, truncated 23:08:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259f0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 808.912484][T19583] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 809.093720][ T4285] Dev loop3: unable to read RDB block 8 [ 809.101003][ T4285] loop3: unable to read partition table [ 809.107599][ T4285] loop3: partition table beyond EOD, truncated 23:08:26 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:26 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xb, 0x0, &(0x7f0000000280)="b95b03b700030000009e40", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 809.666968][T19627] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 809.789384][ T4285] Dev loop3: unable to read RDB block 8 [ 809.803663][ T4285] loop3: unable to read partition table [ 809.809834][ T4285] loop3: partition table beyond EOD, truncated 23:08:27 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:27 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000066061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:27 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xb, 0x0, &(0x7f0000000280)="b95b03b700030000009e40", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 810.267198][T19634] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:27 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xb, 0x0, &(0x7f0000000280)="b95b03b700030000009e40", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 810.485629][T19676] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 810.619933][ T4285] Dev loop3: unable to read RDB block 8 [ 810.667000][ T4285] loop3: unable to read partition table [ 810.681103][ T4285] loop3: partition table beyond EOD, truncated [ 810.772121][ T4285] Dev loop3: unable to read RDB block 8 [ 810.782826][ T4285] loop3: unable to read partition table [ 810.789877][ T4285] loop3: partition table beyond EOD, truncated 23:08:28 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:28 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xd, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 811.142482][T19720] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 811.201206][T19725] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 811.285628][ T4285] Dev loop3: unable to read RDB block 8 [ 811.291378][ T4285] loop3: unable to read partition table [ 811.312436][ T4285] loop3: partition table beyond EOD, truncated [ 811.348848][T19676] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 811.377884][T19680] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:28 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:28 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xd, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:28 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000076061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:28 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xd, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 811.949979][T19764] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 811.976857][T19771] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) [ 812.002331][ T4285] Dev loop3: unable to read RDB block 8 [ 812.036333][ T4285] loop3: unable to read partition table 23:08:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 812.047835][T19780] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 812.064013][ T4285] loop3: partition table beyond EOD, truncated 23:08:29 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:29 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 812.571122][T19813] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 812.658316][ T4285] Dev loop3: unable to read RDB block 8 [ 812.670507][ T4285] loop3: unable to read partition table [ 812.682263][ T4285] loop3: partition table beyond EOD, truncated 23:08:30 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00000e006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:30 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:08:30 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:30 executing program 3: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 813.191769][T19852] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 813.202333][T19853] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 813.207462][T19816] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 813.264294][T19863] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 813.406317][ T4285] Dev loop3: unable to read RDB block 8 [ 813.412020][ T4285] loop3: unable to read partition table [ 813.434108][ T4285] loop3: partition table beyond EOD, truncated [ 813.535183][ T4285] Dev loop3: unable to read RDB block 8 [ 813.541002][ T4285] loop3: unable to read partition table [ 813.549488][ T4285] loop3: partition table beyond EOD, truncated 23:08:31 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x2) [ 814.088558][T19894] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 814.185829][ T4285] Dev loop3: unable to read RDB block 8 [ 814.195542][T19905] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 814.233871][ T4285] loop3: unable to read partition table [ 814.241732][ T4285] loop3: partition table beyond EOD, truncated 23:08:31 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:31 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000096061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 23:08:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025aa0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) 23:08:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) [ 814.799859][T19928] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 814.802172][T19903] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ab0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r1, r0) [ 814.881152][T19894] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 814.953726][ T4285] Dev loop3: unable to read RDB block 8 [ 814.959346][ T4285] loop3: unable to read partition table [ 814.997134][ T4285] loop3: partition table beyond EOD, truncated [ 815.428096][T19934] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 815.450824][ T4285] Dev loop3: unable to read RDB block 8 [ 815.479414][ T4285] loop3: unable to read partition table [ 815.492051][ T4285] loop3: partition table beyond EOD, truncated 23:08:32 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ac0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r1, r0) 23:08:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) [ 815.833448][T19990] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 815.957443][ T4285] Dev loop3: unable to read RDB block 8 [ 815.972341][ T4285] loop3: unable to read partition table [ 815.979901][ T4285] loop3: partition table beyond EOD, truncated 23:08:33 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:33 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000000a6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ad0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r1, r0) 23:08:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ae0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r1, r0) [ 816.427181][T19999] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) [ 816.678877][ T4285] Dev loop3: unable to read RDB block 8 [ 816.705178][ T4285] loop3: unable to read partition table [ 816.705433][ T4285] loop3: partition table beyond EOD, truncated [ 816.880937][T20039] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:34 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025af0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 23:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) [ 817.297661][T20089] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 817.347398][T20095] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 817.439217][ T4285] Dev loop3: unable to read RDB block 8 [ 817.450722][ T4285] loop3: unable to read partition table [ 817.459144][ T4285] loop3: partition table beyond EOD, truncated 23:08:34 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000012006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 23:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:34 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 817.908561][T20125] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 23:08:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) [ 818.127215][T20151] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 818.176278][ T4285] Dev loop3: unable to read RDB block 8 [ 818.198979][T20089] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 818.211510][ T4285] loop3: unable to read partition table [ 818.231341][ T4285] loop3: partition table beyond EOD, truncated [ 818.384074][ T4285] Dev loop3: unable to read RDB block 8 [ 818.389825][ T4285] loop3: unable to read partition table [ 818.396822][ T4285] loop3: partition table beyond EOD, truncated 23:08:35 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 23:08:35 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 818.782742][ T4285] Dev loop3: unable to read RDB block 8 [ 818.791097][T20190] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 818.801601][ T4285] loop3: unable to read partition table [ 818.840821][ T4285] loop3: partition table beyond EOD, truncated [ 818.872155][T20196] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 819.095476][T20125] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:36 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:36 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:36 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 23:08:36 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) [ 819.252566][T20225] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 819.282406][T20232] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 819.306157][T20190] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 819.438559][ T4285] Dev loop3: unable to read RDB block 8 [ 819.469961][ T4285] loop3: unable to read partition table [ 819.498473][ T4285] loop3: partition table beyond EOD, truncated [ 819.685014][ T4285] Dev loop3: unable to read RDB block 8 [ 819.690806][ T4285] loop3: unable to read partition table [ 819.696941][ T4285] loop3: partition table beyond EOD, truncated 23:08:37 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002380)='/dev/uinput\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 23:08:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 820.140869][T20273] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 820.211525][ T4285] Dev loop3: unable to read RDB block 8 [ 820.223681][ T4285] loop3: unable to read partition table [ 820.231415][ T4285] loop3: partition table beyond EOD, truncated [ 820.272996][T20280] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:37 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:37 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 820.501108][T20310] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b324d"], 0x4) 23:08:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 820.666536][ T4285] Dev loop3: unable to read RDB block 8 [ 820.704805][ T4285] loop3: unable to read partition table 23:08:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 820.741791][ T4285] loop3: partition table beyond EOD, truncated [ 821.663632][T20280] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:38 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 23:08:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:38 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 821.948795][T20374] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 821.950948][T20373] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:39 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000048006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 822.070431][T20388] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 822.081489][ T4285] Dev loop3: unable to read RDB block 8 23:08:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x0) [ 822.119837][ T4285] loop3: unable to read partition table [ 822.154013][ T4285] loop3: partition table beyond EOD, truncated 23:08:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ba0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x0) 23:08:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bb0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 822.645632][ T4285] Dev loop3: unable to read RDB block 8 [ 822.671841][ T4285] loop3: unable to read partition table [ 822.691333][ T4285] loop3: partition table beyond EOD, truncated [ 822.861593][ T4285] Dev loop3: unable to read RDB block 8 [ 822.885408][ T4285] loop3: unable to read partition table [ 822.895181][ T4285] loop3: partition table beyond EOD, truncated [ 822.900250][T20393] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 823.316947][T20374] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:40 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff001200006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x0) 23:08:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bc0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:40 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:40 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) 23:08:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bd0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 823.825047][T20454] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 823.864071][T20453] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 823.916270][T20464] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) 23:08:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025be0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 824.183185][ T4285] Dev loop3: unable to read RDB block 8 23:08:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) [ 824.263919][ T4285] loop3: unable to read partition table 23:08:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bf0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 824.320383][ T4285] loop3: partition table beyond EOD, truncated [ 824.666777][ T4285] Dev loop3: unable to read RDB block 8 [ 824.675011][ T4285] loop3: unable to read partition table [ 824.680973][ T4285] loop3: partition table beyond EOD, truncated [ 824.847433][T20462] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 825.160469][T20454] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:42 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff002000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b"], 0x2) 23:08:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:42 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 825.592649][T20462] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 825.704964][ T4285] Dev loop3: unable to read RDB block 8 [ 825.724099][ T4285] loop3: unable to read partition table [ 825.737814][ T4285] loop3: partition table beyond EOD, truncated [ 825.848424][T20535] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:43 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b"], 0x2) 23:08:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b"], 0x2) 23:08:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 826.583671][ T4285] Dev loop3: unable to read RDB block 8 [ 826.590386][T20573] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b32"], 0x3) [ 826.624435][ T4285] loop3: unable to read partition table [ 826.644851][ T4285] loop3: partition table beyond EOD, truncated 23:08:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 827.048461][ T4285] Dev loop3: unable to read RDB block 8 [ 827.081190][ T4285] loop3: unable to read partition table [ 827.104897][ T4285] loop3: partition table beyond EOD, truncated [ 827.145744][T20527] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:44 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b32"], 0x3) 23:08:44 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 827.918318][T20614] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 827.936520][T20625] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 827.976502][ T4285] Dev loop3: unable to read RDB block 8 [ 827.989197][T20617] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 827.999387][ T4285] loop3: unable to read partition table [ 828.024311][ T4285] loop3: partition table beyond EOD, truncated [ 828.311870][T20573] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:45 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b5b32"], 0x3) 23:08:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:45 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:45 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r0, 0x40084146, &(0x7f00000000c0)) 23:08:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 828.936274][T20665] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 828.954861][T20666] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 829.019056][T20675] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 829.039356][ T4285] Dev loop3: unable to read RDB block 8 [ 829.077548][ T4285] loop3: unable to read partition table [ 829.107460][ T4285] loop3: partition table beyond EOD, truncated [ 829.235295][ T4285] Dev loop3: unable to read RDB block 8 [ 829.241390][ T4285] loop3: unable to read partition table [ 829.257619][ T4285] loop3: partition table beyond EOD, truncated [ 829.483808][T20617] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 829.824467][T20666] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:47 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="68000000100005070000f9bbc7e4b627ef400000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="b1095fdfe8d99b634415afcd2d83413c5068820300baca9e5914fbbcedb810a608c14c8df202ec012aae962f6bd03031e0f12428a3da8fd0c1b03ae88a37621399519fed5f5d96fc9c433a3320dd08d1524c0e4ab489efa5f7572479fe854a"], 0x68}}, 0x0) 23:08:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:47 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 830.109838][T20730] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 830.194060][T20742] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:47 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ca0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cb0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 831.131724][T20765] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 831.202844][ T4285] Dev loop3: unable to read RDB block 8 [ 831.208509][ T4285] loop3: unable to read partition table [ 831.252726][ T4285] loop3: partition table beyond EOD, truncated [ 832.052070][T20736] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:49 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff004000006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}], 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:08:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cc0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:49 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:49 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="8da0250192f09c09c7e728d49230538d393e88d00380c12e076f8f47693b61dad524e3edc46522d1fd57c6524c4f25a7d22c25c70c6cfeaf67f7ec2ad090f7e882a01c83a962e1e3ae8e29ec71f59811d463cca26b2d814f486166bf58777019c6411491b937251516a564859e41cf82463e89e46a4ee46a332f8364b0f7ac63ba3a"], &(0x7f00000006c0)='./file0\x00', &(0x7f0000000b00)='nfs\x00', 0x0, &(0x7f0000000000)) [ 832.529410][T20840] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cd0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 832.619456][ T4285] Dev loop3: unable to read RDB block 8 [ 832.632248][T20849] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 832.682865][ T4285] loop3: unable to read partition table [ 832.721399][ T4285] loop3: partition table beyond EOD, truncated 23:08:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ce0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cf0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 833.091756][ T4285] Dev loop3: unable to read RDB block 8 [ 833.138984][ T4285] loop3: unable to read partition table [ 833.177668][ T4285] loop3: partition table beyond EOD, truncated [ 833.537129][T20845] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:50 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:50 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:50 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 834.046914][T20919] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 834.249081][ T4285] Dev loop3: unable to read RDB block 8 [ 834.274209][ T4285] loop3: unable to read partition table [ 834.296926][ T4285] loop3: partition table beyond EOD, truncated 23:08:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 834.419466][T20923] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 834.597307][ T4285] Dev loop3: unable to read RDB block 8 [ 834.639565][ T4285] loop3: unable to read partition table [ 834.671000][ T4285] loop3: partition table beyond EOD, truncated 23:08:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 835.369211][T20919] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 835.510094][T20923] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:52 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) 23:08:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:52 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000606061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:52 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff00003b016061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 835.970666][T21020] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) [ 836.026943][T21019] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 836.061741][T21028] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 836.076408][ T4285] Dev loop3: unable to read RDB block 8 [ 836.106548][ T4285] loop3: unable to read partition table [ 836.139499][ T4285] loop3: partition table beyond EOD, truncated 23:08:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) 23:08:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:53 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 836.475958][ T4285] Dev loop3: unable to read RDB block 8 [ 836.515998][ T4285] loop3: unable to read partition table [ 836.556162][ T4285] loop3: partition table beyond EOD, truncated [ 836.909375][T21018] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 837.282635][T21074] netlink: 131070 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:54 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025da0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:54 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:54 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 837.527099][T21087] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 837.540621][T21088] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025db0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025dc0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 837.734018][ T4285] Dev loop3: unable to read RDB block 8 [ 837.753312][ T4285] loop3: unable to read partition table [ 837.770041][ T4285] loop3: partition table beyond EOD, truncated [ 837.894531][ T4285] Dev loop3: unable to read RDB block 8 [ 837.902780][ T4285] loop3: unable to read partition table [ 837.908751][ T4285] loop3: partition table beyond EOD, truncated [ 837.997041][ T4285] Dev loop3: unable to read RDB block 8 [ 838.002837][ T4285] loop3: unable to read partition table [ 838.008673][ T4285] loop3: partition table beyond EOD, truncated [ 838.153877][T21096] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 838.557354][T21088] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 838.635778][T21096] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:56 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:56 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 23:08:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025dd0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:56 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:56 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:56 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) [ 839.082640][T21179] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 839.113386][T21182] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025de0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 839.159097][T21192] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:56 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 23:08:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 839.311147][ T4285] Dev loop3: unable to read RDB block 8 [ 839.345915][ T4285] loop3: unable to read partition table 23:08:56 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 839.380086][ T4285] loop3: partition table beyond EOD, truncated [ 839.522703][ T4285] Dev loop3: unable to read RDB block 8 [ 839.528609][ T4285] loop3: unable to read partition table [ 839.551061][ T4285] loop3: partition table beyond EOD, truncated [ 839.646593][T21181] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 840.128127][T21179] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 840.267227][T21181] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:57 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025df0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:57 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:57 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000746061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:57 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 840.679297][T21272] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 840.711173][T21275] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 840.732574][T21288] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 840.768618][ T4285] Dev loop3: unable to read RDB block 8 23:08:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:57 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 840.805312][ T4285] loop3: unable to read partition table [ 840.836303][ T4285] loop3: partition table beyond EOD, truncated 23:08:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 841.065258][ T4285] Dev loop3: unable to read RDB block 8 [ 841.078789][ T4285] loop3: unable to read partition table [ 841.097240][ T4285] loop3: partition table beyond EOD, truncated [ 841.400839][T21281] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 841.831250][T21272] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:08:59 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:08:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:59 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:59 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:08:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) [ 842.209150][T21374] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 842.219558][T21380] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:08:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 842.290570][T21388] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:08:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:08:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:08:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 842.469500][ T4285] Dev loop3: unable to read RDB block 8 [ 842.505980][ T4285] loop3: unable to read partition table [ 842.530714][ T4285] loop3: partition table beyond EOD, truncated [ 842.884689][T21397] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:00 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:09:00 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 843.450679][T21460] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 843.451378][T21394] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 843.649644][ T4285] Dev loop3: unable to read RDB block 8 [ 843.664418][ T4285] loop3: unable to read partition table [ 843.677043][ T4285] loop3: partition table beyond EOD, truncated [ 843.931020][T21471] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:01 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x7040, 0x0) 23:09:01 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) [ 844.261561][T21520] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 844.312901][T21527] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 844.399701][ T4285] Dev loop3: unable to read RDB block 8 [ 844.424604][ T4285] loop3: unable to read partition table [ 844.439471][ T4285] loop3: partition table beyond EOD, truncated [ 844.576997][ T4285] Dev loop3: unable to read RDB block 8 [ 844.586012][ T4285] loop3: unable to read partition table [ 844.591950][ T4285] loop3: partition table beyond EOD, truncated [ 844.736809][T21485] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 845.048826][T21527] netlink: 131070 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:02 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff007a00006061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) 23:09:02 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae0a00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:02 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025e90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 845.257924][T21576] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x7040, 0x0) 23:09:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ea0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x20) 23:09:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 845.546365][ T4285] Dev loop3: unable to read RDB block 8 [ 845.591138][ T4285] loop3: unable to read partition table [ 845.638951][ T4285] loop3: partition table beyond EOD, truncated [ 845.769073][ T4285] Dev loop3: unable to read RDB block 8 [ 845.775728][ T4285] loop3: unable to read partition table [ 845.783571][ T4285] loop3: partition table beyond EOD, truncated [ 845.954456][T21589] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 846.487542][T21589] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:03 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025eb0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:03 executing program 3: 23:09:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:03 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:03 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:03 executing program 3: [ 846.874456][T21682] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 846.876236][T21687] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ec0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 846.984193][ T4285] Dev loop3: unable to read RDB block 8 [ 847.003710][ T4285] loop3: unable to read partition table [ 847.010087][ T4285] loop3: partition table beyond EOD, truncated 23:09:04 executing program 3: 23:09:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ed0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:04 executing program 3: [ 847.376159][ T4285] Dev loop3: unable to read RDB block 8 [ 847.389695][ T4285] loop3: unable to read partition table [ 847.397212][ T4285] loop3: partition table beyond EOD, truncated [ 847.475320][ T4285] Dev loop3: unable to read RDB block 8 [ 847.515512][ T4285] loop3: unable to read partition table [ 847.528598][ T4285] loop3: partition table beyond EOD, truncated [ 847.717388][T21690] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:05 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ee0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:05 executing program 3: 23:09:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:05 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 848.492976][T21769] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 848.546866][ T4285] Dev loop3: unable to read RDB block 8 [ 848.578857][ T4285] loop3: unable to read partition table [ 848.616109][ T4285] loop3: partition table beyond EOD, truncated 23:09:06 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000000b6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:06 executing program 3: 23:09:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ef0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:06 executing program 3: 23:09:06 executing program 3: 23:09:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f00535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 849.669068][T21814] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 849.744164][ T4285] Dev loop3: unable to read RDB block 8 [ 849.750237][ T4285] loop3: unable to read partition table [ 849.815494][ T4285] loop3: partition table beyond EOD, truncated [ 850.004566][ T4285] Dev loop3: unable to read RDB block 8 [ 850.025859][ T4285] loop3: unable to read partition table [ 850.048060][ T4285] loop3: partition table beyond EOD, truncated 23:09:07 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:07 executing program 3: 23:09:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f10535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:07 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 850.670448][T21863] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 850.849261][ T4285] Dev loop3: unable to read RDB block 8 [ 850.882999][ T4285] loop3: unable to read partition table [ 850.907166][ T4285] loop3: partition table beyond EOD, truncated 23:09:08 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:08 executing program 3: 23:09:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f20535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:08 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:08 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 851.967016][T21903] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:09 executing program 3: 23:09:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f30535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 852.103105][T21919] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:09 executing program 3: [ 852.177025][ T4285] Dev loop3: unable to read RDB block 8 23:09:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f40535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 852.217944][ T4285] loop3: unable to read partition table [ 852.245223][ T4285] loop3: partition table beyond EOD, truncated 23:09:09 executing program 3: 23:09:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f50535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 852.686992][ T4285] Dev loop3: unable to read RDB block 8 [ 852.702098][ T4285] loop3: unable to read partition table [ 852.736289][ T4285] loop3: partition table beyond EOD, truncated [ 853.135321][T21906] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 853.286470][T21916] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:10 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:10 executing program 3: 23:09:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f60535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:10 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:10 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:10 executing program 3: 23:09:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f70535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 853.859932][T21988] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 853.874971][ T4285] Dev loop3: unable to read RDB block 8 23:09:10 executing program 3: [ 853.913039][ T4285] loop3: unable to read partition table [ 853.937197][ T4285] loop3: partition table beyond EOD, truncated 23:09:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f80535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:11 executing program 3: 23:09:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025f90535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 854.435704][T21990] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 854.877994][T22003] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:12 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:12 executing program 3: 23:09:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025fa0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:12 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e06142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:12 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:12 executing program 3: 23:09:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025fb0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 855.470112][T22073] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:12 executing program 3: 23:09:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025fc0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 855.563292][ T4285] Dev loop3: unable to read RDB block 8 [ 855.595444][ T4285] loop3: unable to read partition table 23:09:12 executing program 3: [ 855.629164][ T4285] loop3: partition table beyond EOD, truncated 23:09:12 executing program 3: [ 855.749228][ T4285] Dev loop3: unable to read RDB block 8 [ 855.761018][ T4285] loop3: unable to read partition table [ 855.767672][ T4285] loop3: partition table beyond EOD, truncated [ 856.089509][T22076] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:13 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000800e6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025fd0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:13 executing program 3: 23:09:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:13 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 856.607564][T22076] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 856.731139][ T4285] Dev loop3: unable to read RDB block 8 [ 856.743732][ T4285] loop3: unable to read partition table [ 856.756452][ T4285] loop3: partition table beyond EOD, truncated [ 856.770294][T22155] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:14 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:14 executing program 3: 23:09:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025fe0535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000635d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:14 executing program 3: 23:09:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000935d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 857.706805][ T4285] Dev loop3: unable to read RDB block 8 [ 857.734014][ T4285] loop3: unable to read partition table [ 857.776191][ T4285] loop3: partition table beyond EOD, truncated [ 858.229638][T22184] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 858.780869][T22194] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 859.012566][T22177] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:16 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:16 executing program 3: 23:09:16 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000a35d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 859.228720][T22260] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 859.453858][ T4285] Dev loop3: unable to read RDB block 8 [ 859.459561][ T4285] loop3: unable to read partition table [ 859.495378][ T4285] loop3: partition table beyond EOD, truncated 23:09:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000b35d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:16 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000056061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:16 executing program 3: 23:09:16 executing program 3: [ 859.919683][T22285] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:17 executing program 3: [ 860.043676][ T4285] Dev loop3: unable to read RDB block 8 [ 860.075652][ T4285] loop3: unable to read partition table [ 860.105440][ T4285] loop3: partition table beyond EOD, truncated 23:09:17 executing program 3: 23:09:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 860.338416][ T4285] Dev loop3: unable to read RDB block 8 [ 860.365902][ T4285] loop3: unable to read partition table [ 860.379122][ T4285] loop3: partition table beyond EOD, truncated [ 860.569278][ T4285] Dev loop3: unable to read RDB block 8 [ 860.591314][ T4285] loop3: unable to read partition table [ 860.646598][T22289] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 860.648201][ T4285] loop3: partition table beyond EOD, truncated [ 861.252242][T22285] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:18 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:18 executing program 3: 23:09:18 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2c}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001135d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:18 executing program 3: [ 861.436434][T22286] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 861.439747][T22347] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 861.571752][ T4285] Dev loop3: unable to read RDB block 8 [ 861.606872][ T4285] loop3: unable to read partition table [ 861.640066][ T4285] loop3: partition table beyond EOD, truncated [ 861.770726][ T4285] Dev loop3: unable to read RDB block 8 [ 861.793813][ T4285] loop3: unable to read partition table [ 861.813166][ T4285] loop3: partition table beyond EOD, truncated [ 861.991347][T22352] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:19 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000066061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:19 executing program 3: 23:09:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:19 executing program 3: 23:09:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:19 executing program 3: [ 862.199685][ T4285] Dev loop3: unable to read RDB block 8 [ 862.261580][ T4285] loop3: unable to read partition table [ 862.267970][T22347] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 862.277056][T22386] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 862.319548][ T4285] loop3: partition table beyond EOD, truncated [ 862.354349][T22394] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 862.442881][ T4285] Dev loop3: unable to read RDB block 8 [ 862.448490][ T4285] loop3: unable to read partition table [ 862.465979][ T4285] loop3: partition table beyond EOD, truncated [ 862.506576][ T4285] Dev loop3: unable to read RDB block 8 [ 862.512354][ T4285] loop3: unable to read partition table [ 862.518067][ T4285] loop3: partition table beyond EOD, truncated [ 863.101154][T22394] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:20 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000206061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30}, {}, {0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001235d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:20 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:20 executing program 3: 23:09:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 863.372957][T22468] __nla_validate_parse: 2 callbacks suppressed [ 863.372966][T22468] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 863.394728][ T4285] Dev loop3: unable to read RDB block 8 [ 863.418582][ T4285] loop3: unable to read partition table [ 863.445889][ T4285] loop3: partition table beyond EOD, truncated [ 863.448915][T22475] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 863.539847][T22475] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 863.656097][ T4285] Dev loop3: unable to read RDB block 8 [ 863.666668][ T4285] loop3: unable to read partition table [ 863.672652][ T4285] loop3: partition table beyond EOD, truncated 23:09:20 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001335d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 863.909755][T22491] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.012685][T22511] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:21 executing program 3: symlink(&(0x7f0000000080)='./file2\x00', &(0x7f00000000c0)='./file0\x00') rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') statx(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x100, 0x0, &(0x7f0000000540)) [ 864.098398][ T4285] Dev loop3: unable to read RDB block 8 [ 864.107984][ T4285] loop3: unable to read partition table [ 864.124008][ T4285] loop3: partition table beyond EOD, truncated 23:09:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="7261770000000000000000000001da0000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030400030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000000000001d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000027465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a60000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000068c80000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) [ 864.303656][ T4285] Dev loop3: unable to read RDB block 8 [ 864.325596][T22523] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 864.340135][ T4285] loop3: unable to read partition table [ 864.368422][ T4285] loop3: partition table beyond EOD, truncated [ 864.648927][ T4285] Dev loop3: unable to read RDB block 8 [ 864.656100][ T4285] loop3: unable to read partition table [ 864.681590][ T4285] loop3: partition table beyond EOD, truncated [ 865.014485][T22495] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 865.027940][T22476] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 865.226676][T22473] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:22 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:22 executing program 3: io_setup(0x7f, &(0x7f00000000c0)=0x0) r1 = eventfd(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r2, r1) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 23:09:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:22 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001435d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001f35d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 865.587950][T22585] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 865.642410][ T4285] Dev loop3: unable to read RDB block 8 [ 865.654271][ T4285] loop3: unable to read partition table [ 865.667299][ T4285] loop3: partition table beyond EOD, truncated 23:09:23 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:23 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) [ 866.264394][ T4285] Dev loop3: unable to read RDB block 8 [ 866.319842][ T4285] loop3: unable to read partition table [ 866.334262][T22603] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:23 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 866.362944][ T4285] loop3: partition table beyond EOD, truncated [ 866.377664][T22590] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 866.949018][ T4285] Dev loop3: unable to read RDB block 8 [ 866.974281][ T4285] loop3: unable to read partition table 23:09:24 executing program 3: setgroups(0x2, &(0x7f0000000200)=[0xee00, 0x0]) socket$inet6_icmp(0xa, 0x2, 0x3a) [ 866.999007][ T4285] loop3: partition table beyond EOD, truncated 23:09:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x1ca, &(0x7f0000000580)={@random="63e8d985f6da", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "a7a345", 0x194, 0x21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65}, @hopopts={0x0, 0xa, [], [@ra, @calipso={0x7, 0x28, {0x0, 0x8, 0xff, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x21, "60698e604756df503e111433322362c15a2750ac1d5a393a089572383263f1a6ee"}]}, @dstopts={0x0, 0x4, [], [@generic={0x0, 0x1f, "ffc2900b29a56f8af19540eb0600821c019feb6e3d554950b9f065bcea99a4"}]}], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "12b752", 0x0, "73af98"}, "84a96d680b97d2968a37858832da2c66da5bf84ad38e31f12dc00667492914289f57796398c1028782c2e932e8150cfc02adf98dd11a92acef4a3281e652c1394c05a3c76ca82ea656712573bb49d0d5188a25dc25b0bd12d6a0d4cde0bf170be2f5919f3aed9c3f92aa4291c57230d00a884205a879be0137e7d95e5c688640cd190016bf9c5658dadb375b19717824552e3b4ce95afd81c514115169f986374e078915f105ddc3dfd993ef37ba10aa315faf3c8b60a752ac31ae037a3b43e01fc9233c6d5203184659e6a860247d6d3ffb503c2113e60fd2a0479c71cdfe285c50529cc7e9147b77118a1c"}}}}}}, 0x0) [ 867.301009][T22643] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 867.551285][T22605] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 867.587281][ T4285] Dev loop3: unable to read RDB block 8 [ 867.598110][ T4285] loop3: unable to read partition table [ 867.605979][ T4285] loop3: partition table beyond EOD, truncated 23:09:24 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000013b6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307a60a05057b513c27050076003639080000000000000000043c2dbd3a795b65fccfffb644d89c2d27", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:09:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025004035d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 867.953557][T22603] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 868.024101][T22686] ptrace attach of "/root/syz-executor.3"[22685] was attempted by "/root/syz-executor.3"[22686] 23:09:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025006435d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14141b}, 0x10) recvfrom(r0, 0x0, 0x0, 0x337, 0x0, 0x0) [ 868.115889][ T4285] Dev loop3: unable to read RDB block 8 [ 868.123358][T22688] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 868.155379][ T4285] loop3: unable to read partition table [ 868.178815][T22694] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 868.205098][ T4285] loop3: partition table beyond EOD, truncated 23:09:26 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000335d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:26 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x1}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) [ 869.022925][ T4285] Dev loop3: unable to read RDB block 8 [ 869.029347][ T4285] loop3: unable to read partition table [ 869.040917][ T4285] loop3: partition table beyond EOD, truncated [ 869.081975][T22726] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x1}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) [ 869.897321][T22732] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 869.918268][T22688] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 870.002174][ T4285] Dev loop3: unable to read RDB block 8 [ 870.016013][ T4285] loop3: unable to read partition table [ 870.036992][ T4285] loop3: partition table beyond EOD, truncated [ 870.468949][T22732] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:27 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = io_uring_setup(0x4bf, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x3, 0x8}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x1c) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 23:09:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000435d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:27 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e0e142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:27 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff0000000a6061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000635d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 870.665169][T22807] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 870.740224][ T4285] Dev loop3: unable to read RDB block 8 [ 870.745835][ T4285] loop3: unable to read partition table [ 870.805583][ T4285] loop3: partition table beyond EOD, truncated 23:09:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000835d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000080)=ANY=[]) 23:09:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000935d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14141b}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) [ 871.331671][ C1] [ 871.334038][ C1] ======================================================== [ 871.341227][ C1] WARNING: possible irq lock inversion dependency detected [ 871.348423][ C1] 5.6.0-syzkaller #0 Not tainted [ 871.353345][ C1] -------------------------------------------------------- [ 871.360529][ C1] ksoftirqd/1/16 just changed the state of lock: [ 871.366834][ C1] ffffffff89209098 (tasklist_lock){.+.?}-{2:2}, at: send_sigurg+0xcd/0x320 [ 871.375401][ C1] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 871.383172][ C1] (&pid->wait_pidfd){+.+.}-{2:2} [ 871.383178][ C1] [ 871.383178][ C1] [ 871.383178][ C1] and interrupts could create inverse lock ordering between them. [ 871.383178][ C1] [ 871.402455][ C1] [ 871.402455][ C1] other info that might help us debug this: [ 871.410486][ C1] Possible interrupt unsafe locking scenario: [ 871.410486][ C1] [ 871.418784][ C1] CPU0 CPU1 [ 871.424131][ C1] ---- ---- [ 871.429470][ C1] lock(&pid->wait_pidfd); [ 871.433953][ C1] local_irq_disable(); [ 871.440699][ C1] lock(tasklist_lock); [ 871.447449][ C1] lock(&pid->wait_pidfd); [ 871.454572][ C1] [ 871.458008][ C1] lock(tasklist_lock); [ 871.462397][ C1] [ 871.462397][ C1] *** DEADLOCK *** [ 871.462397][ C1] [ 871.470608][ C1] 4 locks held by ksoftirqd/1/16: [ 871.475605][ C1] #0: ffffffff892e69d0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x9/0x30 [ 871.485056][ C1] #1: ffffffff892e69d0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 [ 871.494335][ C1] #2: ffff8880a3604160 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x3393/0x49f0 [ 871.503699][ C1] #3: ffff8880a753ce78 (&f->f_owner.lock){.+.?}-{2:2}, at: send_sigurg+0x24/0x320 [ 871.513060][ C1] [ 871.513060][ C1] the shortest dependencies between 2nd lock and 1st lock: [ 871.522644][ C1] -> (&pid->wait_pidfd){+.+.}-{2:2} { [ 871.528122][ C1] HARDIRQ-ON-W at: [ 871.532277][ C1] lock_acquire+0x169/0x480 [ 871.538757][ C1] _raw_spin_lock+0x2a/0x40 [ 871.545062][ C1] proc_pid_make_inode+0x187/0x2d0 [ 871.551968][ C1] proc_pid_instantiate+0x4b/0x1a0 [ 871.558960][ C1] proc_pid_lookup+0x218/0x2f0 [ 871.565519][ C1] proc_root_lookup+0x1b/0x50 [ 871.571998][ C1] __lookup_slow+0x240/0x370 [ 871.578480][ C1] walk_component+0x442/0x680 [ 871.585218][ C1] link_path_walk+0x66d/0xba0 [ 871.591885][ C1] path_openat+0x21d/0x38b0 [ 871.598203][ C1] do_filp_open+0x2b4/0x3a0 [ 871.604662][ C1] do_sys_openat2+0x463/0x6f0 [ 871.611174][ C1] __x64_sys_open+0x1af/0x1e0 [ 871.617656][ C1] do_syscall_64+0xf3/0x1b0 [ 871.624044][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 871.631730][ C1] SOFTIRQ-ON-W at: [ 871.635783][ C1] lock_acquire+0x169/0x480 [ 871.642080][ C1] _raw_spin_lock+0x2a/0x40 [ 871.648379][ C1] proc_pid_make_inode+0x187/0x2d0 [ 871.655284][ C1] proc_pid_instantiate+0x4b/0x1a0 [ 871.662209][ C1] proc_pid_lookup+0x218/0x2f0 [ 871.668789][ C1] proc_root_lookup+0x1b/0x50 [ 871.675286][ C1] __lookup_slow+0x240/0x370 [ 871.681688][ C1] walk_component+0x442/0x680 [ 871.688170][ C1] link_path_walk+0x66d/0xba0 [ 871.694646][ C1] path_openat+0x21d/0x38b0 [ 871.700966][ C1] do_filp_open+0x2b4/0x3a0 [ 871.707263][ C1] do_sys_openat2+0x463/0x6f0 [ 871.713736][ C1] __x64_sys_open+0x1af/0x1e0 [ 871.720226][ C1] do_syscall_64+0xf3/0x1b0 [ 871.726529][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 871.734213][ C1] INITIAL USE at: [ 871.738167][ C1] lock_acquire+0x169/0x480 [ 871.744378][ C1] _raw_spin_lock_irqsave+0x9e/0xc0 [ 871.751284][ C1] __wake_up+0xb8/0x150 [ 871.757177][ C1] do_notify_parent+0x167/0xce0 [ 871.763748][ C1] do_exit+0x12c5/0x1f80 [ 871.769835][ C1] call_usermodehelper_exec_async+0x47c/0x480 [ 871.777636][ C1] ret_from_fork+0x24/0x30 [ 871.783764][ C1] } [ 871.786355][ C1] ... key at: [] alloc_pid.__key+0x0/0x10 [ 871.794221][ C1] ... acquired at: [ 871.798100][ C1] lock_acquire+0x169/0x480 [ 871.802769][ C1] _raw_spin_lock_irqsave+0x9e/0xc0 [ 871.808132][ C1] __wake_up+0xb8/0x150 [ 871.812525][ C1] do_notify_parent+0x167/0xce0 [ 871.817528][ C1] do_exit+0x12c5/0x1f80 [ 871.821927][ C1] call_usermodehelper_exec_async+0x47c/0x480 [ 871.828149][ C1] ret_from_fork+0x24/0x30 [ 871.832834][ C1] [ 871.835149][ C1] -> (tasklist_lock){.+.?}-{2:2} { [ 871.840242][ C1] HARDIRQ-ON-R at: [ 871.844209][ C1] lock_acquire+0x169/0x480 [ 871.850352][ C1] _raw_read_lock+0x2d/0x40 [ 871.856493][ C1] do_wait+0x280/0x6a0 [ 871.862185][ C1] kernel_wait4+0x1d1/0x2c0 [ 871.868309][ C1] call_usermodehelper_exec_work+0xea/0x320 [ 871.875824][ C1] process_one_work+0x76e/0xfd0 [ 871.882306][ C1] worker_thread+0xa7f/0x1450 [ 871.888604][ C1] kthread+0x353/0x380 [ 871.894307][ C1] ret_from_fork+0x24/0x30 [ 871.900339][ C1] IN-SOFTIRQ-R at: [ 871.904294][ C1] lock_acquire+0x169/0x480 [ 871.910505][ C1] _raw_read_lock+0x2d/0x40 [ 871.916629][ C1] send_sigurg+0xcd/0x320 [ 871.922580][ C1] sk_send_sigurg+0x6a/0xb0 [ 871.928706][ C1] tcp_urg+0x270/0xad0 [ 871.934482][ C1] tcp_rcv_established+0x90b/0x1fa0 [ 871.941783][ C1] tcp_v4_do_rcv+0x398/0x860 [ 871.947993][ C1] tcp_v4_rcv+0x3c1c/0x49f0 [ 871.954119][ C1] ip_protocol_deliver_rcu+0x390/0x750 [ 871.961199][ C1] ip_local_deliver+0x311/0x490 [ 871.967673][ C1] __netif_receive_skb+0x136/0x370 [ 871.974407][ C1] process_backlog+0x4e8/0x950 [ 871.980805][ C1] net_rx_action+0x62f/0x1140 [ 871.987114][ C1] __do_softirq+0x268/0x80c [ 871.993252][ C1] run_ksoftirqd+0x60/0xf0 [ 871.999397][ C1] smpboot_thread_fn+0x572/0x970 [ 872.005966][ C1] kthread+0x353/0x380 [ 872.011664][ C1] ret_from_fork+0x24/0x30 [ 872.017787][ C1] SOFTIRQ-ON-R at: [ 872.021741][ C1] lock_acquire+0x169/0x480 [ 872.027869][ C1] _raw_read_lock+0x2d/0x40 [ 872.033994][ C1] do_wait+0x280/0x6a0 [ 872.039684][ C1] kernel_wait4+0x1d1/0x2c0 [ 872.045824][ C1] call_usermodehelper_exec_work+0xea/0x320 [ 872.053348][ C1] process_one_work+0x76e/0xfd0 [ 872.059849][ C1] worker_thread+0xa7f/0x1450 [ 872.066278][ C1] kthread+0x353/0x380 [ 872.072785][ C1] ret_from_fork+0x24/0x30 [ 872.078841][ C1] INITIAL USE at: [ 872.082732][ C1] lock_acquire+0x169/0x480 [ 872.088955][ C1] _raw_write_lock_irq+0x67/0x80 [ 872.095430][ C1] copy_process+0x3076/0x5370 [ 872.101649][ C1] _do_fork+0x134/0x650 [ 872.107603][ C1] kernel_thread+0xdf/0x130 [ 872.113640][ C1] rest_init+0x1f/0x2a0 [ 872.119340][ C1] start_kernel+0x674/0x774 [ 872.125382][ C1] secondary_startup_64+0xa4/0xb0 [ 872.132031][ C1] } [ 872.134512][ C1] ... key at: [] tasklist_lock+0x18/0x40 [ 872.142281][ C1] ... acquired at: [ 872.146059][ C1] mark_lock+0x529/0x1b00 [ 872.150550][ C1] __lock_acquire+0xaa7/0x2b90 [ 872.155551][ C1] lock_acquire+0x169/0x480 [ 872.160366][ C1] _raw_read_lock+0x2d/0x40 [ 872.165022][ C1] send_sigurg+0xcd/0x320 [ 872.169694][ C1] sk_send_sigurg+0x6a/0xb0 [ 872.174357][ C1] tcp_urg+0x270/0xad0 [ 872.178679][ C1] tcp_rcv_established+0x90b/0x1fa0 [ 872.184026][ C1] tcp_v4_do_rcv+0x398/0x860 [ 872.188773][ C1] tcp_v4_rcv+0x3c1c/0x49f0 [ 872.193438][ C1] ip_protocol_deliver_rcu+0x390/0x750 [ 872.199136][ C1] ip_local_deliver+0x311/0x490 [ 872.204138][ C1] __netif_receive_skb+0x136/0x370 [ 872.209400][ C1] process_backlog+0x4e8/0x950 [ 872.214321][ C1] net_rx_action+0x62f/0x1140 [ 872.219144][ C1] __do_softirq+0x268/0x80c [ 872.223792][ C1] run_ksoftirqd+0x60/0xf0 [ 872.228355][ C1] smpboot_thread_fn+0x572/0x970 [ 872.233451][ C1] kthread+0x353/0x380 [ 872.238823][ C1] ret_from_fork+0x24/0x30 [ 872.243404][ C1] [ 872.245709][ C1] [ 872.245709][ C1] stack backtrace: [ 872.251592][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-syzkaller #0 [ 872.259381][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.269432][ C1] Call Trace: [ 872.272716][ C1] dump_stack+0x1e9/0x30e [ 872.277025][ C1] print_irq_inversion_bug+0xb67/0xe90 [ 872.282477][ C1] ? arch_stack_walk+0xb4/0xe0 [ 872.287234][ C1] ? ret_from_fork+0x24/0x30 [ 872.291819][ C1] check_usage_forwards+0x13f/0x240 [ 872.296993][ C1] ? save_trace+0x49/0xb60 [ 872.301393][ C1] mark_lock+0x529/0x1b00 [ 872.305696][ C1] ? check_usage_backwards+0x240/0x240 [ 872.311132][ C1] ? mark_lock+0x102/0x1b00 [ 872.315617][ C1] __lock_acquire+0xaa7/0x2b90 [ 872.320356][ C1] ? tcp_ack+0x4545/0x67f0 [ 872.324954][ C1] lock_acquire+0x169/0x480 [ 872.329443][ C1] ? send_sigurg+0xcd/0x320 [ 872.333932][ C1] _raw_read_lock+0x2d/0x40 [ 872.338437][ C1] ? send_sigurg+0xcd/0x320 [ 872.343024][ C1] send_sigurg+0xcd/0x320 [ 872.347334][ C1] sk_send_sigurg+0x6a/0xb0 [ 872.351948][ C1] tcp_urg+0x270/0xad0 [ 872.356014][ C1] tcp_rcv_established+0x90b/0x1fa0 [ 872.361206][ C1] ? lock_acquire+0x169/0x480 [ 872.365883][ C1] ? tcp_v4_rcv+0x3393/0x49f0 [ 872.370541][ C1] tcp_v4_do_rcv+0x398/0x860 [ 872.375119][ C1] tcp_v4_rcv+0x3c1c/0x49f0 [ 872.380225][ C1] ? rcu_lockdep_current_cpu_online+0xce/0xf0 [ 872.386268][ C1] ip_protocol_deliver_rcu+0x390/0x750 [ 872.391700][ C1] ip_local_deliver+0x311/0x490 [ 872.396527][ C1] ? ip_local_deliver_finish+0x2f0/0x2f0 [ 872.402133][ C1] __netif_receive_skb+0x136/0x370 [ 872.407217][ C1] ? debug_smp_processor_id+0x5/0x20 [ 872.412475][ C1] process_backlog+0x4e8/0x950 [ 872.417216][ C1] net_rx_action+0x62f/0x1140 [ 872.421869][ C1] __do_softirq+0x268/0x80c [ 872.426344][ C1] ? run_ksoftirqd+0x60/0xf0 [ 872.430906][ C1] run_ksoftirqd+0x60/0xf0 [ 872.435293][ C1] ? ksoftirqd_should_run+0x20/0x20 [ 872.440573][ C1] smpboot_thread_fn+0x572/0x970 [ 872.445512][ C1] kthread+0x353/0x380 [ 872.449563][ C1] ? cpu_report_death+0x110/0x110 [ 872.454560][ C1] ? kthread_blkcg+0xd0/0xd0 [ 872.459124][ C1] ret_from_fork+0x24/0x30 [ 872.612223][ T4285] Dev loop3: unable to read RDB block 8 [ 872.617824][ T4285] loop3: unable to read partition table [ 872.645415][ T4285] loop3: partition table beyond EOD, truncated [ 872.797370][T22807] ieee80211 phy1162: Selected rate control algorithm 'minstrel_ht' [ 872.812560][T22822] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 872.880913][T22822] ieee80211 phy1163: Selected rate control algorithm 'minstrel_ht' [ 872.896305][T22846] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 872.950353][T22846] ieee80211 phy1164: Selected rate control algorithm 'minstrel_ht' [ 873.223352][T22807] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:30 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000580)={@random="63e8d985f6da", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "481f00", 0x18, 0x3a, 0x0, @remote, @mcast2, {[@fragment], @ni}}}}}, 0x0) 23:09:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:30 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000a35d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:30 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 873.278921][T22807] ieee80211 phy1165: Selected rate control algorithm 'minstrel_ht' 23:09:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000b35d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 873.369727][T22914] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. [ 873.378131][T22922] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:09:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000580)={@random="63e8d985f6da", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "481f00", 0x18, 0x3a, 0x0, @remote, @mcast2, {[@fragment], @ni}}}}}, 0x0) [ 873.516477][ T4285] Dev loop3: unable to read RDB block 8 [ 873.526949][ T4285] loop3: unable to read partition table [ 873.553224][ T4285] loop3: partition table beyond EOD, truncated 23:09:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 873.641830][T22953] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:09:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="bab36ffdd953dd774229c6a0e0d23e83d6f028c572d0cbb5a00b0a3c89efab2f70f7926febd73f24941279437020014c051fafa915155845e012e9a146eeae8bad2a62a7be1721032a0a0d2436852e3f2460d296a6fa0fa2f40fee57aa665a0aa6704edee0185599a7a728854f3aac89e8c69724d7d9b5a6a946d263af2c47fa7a3e66113c9ef10b96a615a9ee702d93737669041fda0117d904eb02e8c968be86712b62295ec0a6f5454c3fec200f6106d0e597877c09fe7c3bcfa04e0759b3579538063f907ad8598c9db5226952a318b32fa87219962a427ce29e604c4c96c1b0ebc2b933606310c9d516952ac2b77ef16758cc7ec57ed1b511b4ff844f0aa21fce80b8f81cbf570757a5334ba14b5bb361a38a39fcc6143495ea9f99a7f8dfda8816a4eb8b669511ea04", @ANYPTR, @ANYPTR64], 0x0, 0x13c}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 873.744619][T22914] ieee80211 phy1166: Selected rate control algorithm 'minstrel_ht' [ 873.775604][T22919] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 873.804513][ T4285] Dev loop3: unable to read RDB block 8 [ 873.842367][ T4285] loop3: unable to read partition table [ 873.877939][T22969] ptrace attach of "/root/syz-executor.3"[22968] was attempted by "/root/syz-executor.3"[22969] [ 873.894361][ T4285] loop3: partition table beyond EOD, truncated 23:09:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r2) [ 874.017028][ T4285] Dev loop3: unable to read RDB block 8 [ 874.024231][ T4285] loop3: unable to read partition table [ 874.032682][T22919] ieee80211 phy1167: Selected rate control algorithm 'minstrel_ht' [ 874.033338][ T4285] loop3: partition table beyond EOD, truncated 23:09:31 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 874.132444][T22938] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 874.201785][ T4285] Dev loop3: unable to read RDB block 8 [ 874.213769][ T4285] loop3: unable to read partition table [ 874.235031][ T4285] loop3: partition table beyond EOD, truncated [ 874.459849][T22914] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 874.484869][T22938] ieee80211 phy1168: Selected rate control algorithm 'minstrel_ht' 23:09:31 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r2) 23:09:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001035d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001135d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:31 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00002a2000/0x2000)=nil, 0x2000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) [ 874.733123][T23031] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 874.870649][ T4285] Dev loop3: unable to read RDB block 8 [ 874.893849][ T4285] loop3: unable to read partition table [ 874.909279][T23043] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:31 executing program 3: syz_emit_ethernet(0x72, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 23:09:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 874.962079][ T4285] loop3: partition table beyond EOD, truncated 23:09:32 executing program 3: syz_emit_ethernet(0x72, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) [ 875.112558][ T4285] Dev loop3: unable to read RDB block 8 [ 875.124753][ T4285] loop3: unable to read partition table [ 875.138146][ T4285] loop3: partition table beyond EOD, truncated [ 875.146589][T23031] ieee80211 phy1169: Selected rate control algorithm 'minstrel_ht' [ 875.162333][T23046] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 875.286627][T23046] ieee80211 phy1170: Selected rate control algorithm 'minstrel_ht' [ 875.304233][T23051] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:32 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 875.389163][T23051] ieee80211 phy1171: Selected rate control algorithm 'minstrel_ht' [ 875.653304][T23051] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:32 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:32 executing program 3: syz_emit_ethernet(0x72, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 23:09:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001235d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 875.714348][T23051] ieee80211 phy1172: Selected rate control algorithm 'minstrel_ht' 23:09:32 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001335d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:32 executing program 3: syz_emit_ethernet(0x72, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) [ 875.821594][T23149] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:32 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 875.945588][T23158] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 875.975758][ T4285] Dev loop3: unable to read RDB block 8 [ 875.986603][T23148] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:33 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e25142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:33 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 23:09:33 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 23:09:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 875.988661][T23149] ieee80211 phy1173: Selected rate control algorithm 'minstrel_ht' [ 876.010194][ T4285] loop3: unable to read partition table [ 876.016038][ T4285] loop3: partition table beyond EOD, truncated [ 876.079658][T23159] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 876.118246][ T4285] Dev loop3: unable to read RDB block 8 [ 876.129611][ T4285] loop3: unable to read partition table [ 876.143630][ T4285] loop3: partition table beyond EOD, truncated [ 876.185563][ T4285] Dev loop3: unable to read RDB block 8 [ 876.198985][ T4285] loop3: unable to read partition table [ 876.208112][ T4285] loop3: partition table beyond EOD, truncated [ 876.309922][ T4285] Dev loop3: unable to read RDB block 8 [ 876.315901][ T4285] loop3: unable to read partition table [ 876.322039][ T4285] loop3: partition table beyond EOD, truncated [ 876.400457][T23159] ieee80211 phy1174: Selected rate control algorithm 'minstrel_ht' [ 876.428246][T23161] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 876.494965][T23161] ieee80211 phy1175: Selected rate control algorithm 'minstrel_ht' [ 876.783859][T23148] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:33 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:33 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 23:09:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001435d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 876.836414][T23148] ieee80211 phy1176: Selected rate control algorithm 'minstrel_ht' 23:09:33 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:33 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:33 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 23:09:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025006435d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 876.968370][T23242] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:34 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) [ 877.031614][T23259] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 23:09:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202002500050ad25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:34 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 23:09:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 877.122035][ T4285] Dev loop3: unable to read RDB block 8 [ 877.149434][ T4285] loop3: unable to read partition table [ 877.159122][ T4285] loop3: partition table beyond EOD, truncated [ 877.240156][ T4285] Dev loop3: unable to read RDB block 8 [ 877.251583][ T4285] loop3: unable to read partition table [ 877.267092][ T4285] loop3: partition table beyond EOD, truncated [ 877.301706][T23242] ieee80211 phy1177: Selected rate control algorithm 'minstrel_ht' [ 877.475155][T23251] ieee80211 phy1178: Selected rate control algorithm 'minstrel_ht' [ 877.585986][T23276] ieee80211 phy1179: Selected rate control algorithm 'minstrel_ht' 23:09:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) 23:09:34 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000606061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:34 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e48142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 877.695611][T23242] ieee80211 phy1180: Selected rate control algorithm 'minstrel_ht' [ 877.941648][T23251] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x6 [ 877.944964][T23351] ieee80211 phy1181: Selected rate control algorithm 'minstrel_ht' 23:09:35 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000523d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:35 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e4c142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 878.327464][T23351] ieee80211 phy1182: Selected rate control algorithm 'minstrel_ht' 23:09:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="030000000000800000006061ae6e005a3a00a7ce13a8b1ac8b9a0dc50496f8f8f557ff0200000000000000000000000000010205000000000000c910ff0025003a080000000000002d0000010015b3439aedfe800000000000000e0c6b1b4e1feb00800000000000000000000000e4a93d5deb8d10a7fc2108dc176150b1af33bdcd014f5acfec372e947d4dd33e5964a82cbbca5b2ebed86311cf190d5f87db368121cd4f0c49fcf2b4c9de6492d11cd0b845ac1c068bd369a14ea68f9da2cb151fc690a17e2a1d5c803b005614bd2824a99cc3fac53a9f17b517f480366d246bd77e4357f5166cc5fdb0cdcf07b7150f029f12737b2970df0300f612b0a35235d00369b33ac006a73f18cd0216107d087f59008e0640f9cd674f07f3998a86e832b1a6888d91a818fb76df8e8f8e3e5b83a85ef296c88582c74f01568b691385a97e6ec2ecf32d0948a8ac51dc5a3e9a3833a9b33482da081ee575c6b656216582982ab8d54d9b9337f9492a1753ffefb5a19685ece356d7857aad29b875f1c7e166717c7f694a13a187b7b1e9d1b8a4065d4ac4683d635ec354ff0e219caf55023b28ee0af4e3adc2ed7d3ad0", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) 23:09:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202002500052bd25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:35 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 878.473521][ T4285] Dev loop3: unable to read RDB block 8 [ 878.493955][ T4285] loop3: unable to read partition table [ 878.511809][ T4285] loop3: partition table beyond EOD, truncated 23:09:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 878.713948][T23415] ieee80211 phy1183: Selected rate control algorithm 'minstrel_ht' 23:09:36 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e60142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) [ 879.031618][T23439] ieee80211 phy1184: Selected rate control algorithm 'minstrel_ht' 23:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) 23:09:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202002500052dd25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 879.096920][ T4285] Dev loop3: unable to read RDB block 8 [ 879.108185][ T4285] loop3: unable to read partition table [ 879.118613][ T4285] loop3: partition table beyond EOD, truncated [ 879.165784][T23487] __nla_validate_parse: 7 callbacks suppressed [ 879.165793][T23487] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 23:09:36 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 879.629190][T23487] ieee80211 phy1185: Selected rate control algorithm 'minstrel_ht' [ 879.657178][T23487] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="030000000000800000006061ae6e005a3a00a7ce13a8b1ac8b9a0dc50496f8f8f557ff0200000000000000000000000000010205000000000000c910ff0025003a080000000000002d0000010015b3439aedfe800000000000000e0c6b1b4e1feb00800000000000000000000000e4a93d5deb8d10a7fc2108dc176150b1af33bdcd014f5acfec372e947d4dd33e5964a82cbbca5b2ebed86311cf190d5f87db368121cd4f0c49fcf2b4c9de6492d11cd0b845ac1c068bd369a14ea68f9da2cb151fc690a17e2a1d5c803b005614bd2824a99cc3fac53a9f17b517f480366d246bd77e4357f5166cc5fdb0cdcf07b7150f029f12737b2970df0300f612b0a35235d00369b33ac006a73f18cd0216107d087f59008e0640f9cd674f07f3998a86e832b1a6888d91a818fb76df8e8f8e3e5b83a85ef296c88582c74f01568b691385a97e6ec2ecf32d0948a8ac51dc5a3e9a3833a9b33482da081ee575c6b656216582982ab8d54d9b9337f9492a1753ffefb5a19685ece356d7857aad29b875f1c7e166717c7f694a13a187b7b1e9d1b8a4065d4ac4683d635ec354ff0e219caf55023b28ee0af4e3adc2ed7d3ad0", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) [ 879.964225][ T4285] Dev loop3: unable to read RDB block 8 [ 879.978660][ T4285] loop3: unable to read partition table [ 879.988456][T23487] ieee80211 phy1186: Selected rate control algorithm 'minstrel_ht' [ 880.010689][ T4285] loop3: partition table beyond EOD, truncated [ 880.014837][T23533] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:37 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e68142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000530d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 23:09:37 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 23:09:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x30, 0x2c}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) [ 880.635981][T23533] ieee80211 phy1187: Selected rate control algorithm 'minstrel_ht' [ 880.654117][T23571] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 880.797797][T23571] ieee80211 phy1188: Selected rate control algorithm 'minstrel_ht' [ 880.797838][ T4285] Dev loop3: unable to read RDB block 8 [ 880.827102][T23595] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.1'. [ 880.827287][ T4285] loop3: unable to read partition table [ 880.854599][ T4285] loop3: partition table beyond EOD, truncated [ 880.900733][T23595] ieee80211 phy1189: Selected rate control algorithm 'minstrel_ht' [ 880.928977][T23571] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 881.031368][T23571] ieee80211 phy1190: Selected rate control algorithm 'minstrel_ht' [ 881.053945][T23533] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.2'. 23:09:38 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000126061ae6e00142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="800000e90c0400000015f70000000004000000000000000100000000"], 0x8c) 23:09:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x1, 0x0, @ioapic={0x10003}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)={0x8, 0xffff0000}) 23:09:38 executing program 4: socket$packet(0x11, 0xa, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x10, 0x0, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000001e80)=ANY=[@ANYBLOB="008300005dff000000006061ae6e6c142f00fe8000000000000000000000000000bbff0200000000000000000000000000010000883ebe7697da68c22445d4d6cfe9a6cad71082c2e84e348a2ba227c9c44de848efb5907f440378e6bf788924ba1e1d904ed3195613eb00d0d44b062cca0199bea36e53608968a03397e19f8b0d643adb9a01de426a1587285f76243d7a305413bcf20346743554291fdbe4d0748b77c4e3524b577bd7f8f9666f75808a90c7cb8a5c6b5f74bd30c9869efe76151f67c183a6566151f05c2f8246f30c4ab7eff455e16a3cb980acdc14b0ce6594ea5c5a16bd2bf0673475faa71bda5c1a30f32b9c077aec903685adcecc3548f0c7a936ebf240d4071e6c3b8db72dab41590af149b4bd8ca0d3a5ca5a437389000e8cb6c8b5617773faa09528d4c47c0b6f570aff5137f6b9df3d5f234fa623798069a7084382eb604a4dab76fc94a9ece7e338f6642f46abb5a85ecbf7542054756e39b691c00d42821e0f301e01c658b783233d1e5d67527febb1f968cd054c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x46) 23:09:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d20a80648c63940d0424fc60050011400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 881.124539][T23533] ieee80211 phy1191: Selected rate control algorithm 'minstrel_ht' [ 881.159103][T23686] netlink: 124938 bytes leftover after parsing attributes in process `syz-executor.0'. [ 881.277523][ T4285] Dev loop3: unable to read RDB block 8 [ 881.298469][ T4285] loop3: unable to read partition table [ 881.311504][ T4285] loop3: partition table beyond EOD, truncated