2534cb9d7aa9e8c41a332a38827fa8f5bbf241478ba9350e585"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x190, 0x0, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x2fb, 0x5, 0x7, 0xfff, 0x9}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x80000000, 0x3, 0x4, 0x8, 0xa2}, 0x1}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x20, 0x40, 0x8, 0x1ff}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x1f}, @TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa}, @TCA_IFE_TYPE={0x6, 0x5, 0xe9bf}]}, {0xe7, 0x6, "4765d59b8efdde98c5ba59aad5b09393b676845f9f44fa02f1ab95c2e02b044731ec7b49eac241811449f036304d3b0f5ce5036ba60c8188df7620b10e7c292201e23e9280351d6816b009d502c46b2cf2aa9a39678cc8d5d127b51a3ee4092277f0356b06632ed81e0d9261c12eb9e67fa8a1f2755d8c21a907c48e8993084c22bda91ce312f83d4998ebf373b227e8b0b8f9936538890f6dd7befaf8817e89a42a8dadc5683056838c794a063799c00667484b66dc99bb5710752e0fdf052bc45ffbbbe83d4b7369e8767d9a7b01b3a4639284f08bfce148812109a357075000ed2f"}, {0xc}, {0xc, 0x8, {0x3}}}}]}, {0x4f0, 0x1, [@m_gact={0xd4, 0x1b, 0x0, 0x0, {{0x9}, {0x94, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x23, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1000, 0x4, 0x8, 0x401, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xd1d, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1d22, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x20, 0x1, 0x0, 0x32}}, @TCA_GACT_PARMS={0x18, 0x2, {0x80, 0x6, 0x3, 0x64d62c03}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x18fb, 0x8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x101, 0x1, 0x20000000, 0x5, 0xffff}}]}, {0x18, 0x6, "3e2ce5180479fdc10fcdd9a9a73b5ac6d81801b2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_bpf={0x1a8, 0x14, 0x0, 0x0, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x101, 0x7, 0x10000000, 0x9, 0xff}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xe5e, 0x4, 0x2, 0x3, 0xee}}, @TCA_ACT_BPF_NAME={0xa, 0x6, './bus\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x8, 0x5, 0x7, 0xcec, 0xf4b}}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_FD={0x8, 0x5, r5}, @TCA_ACT_BPF_NAME={0x10, 0x6, './bus/file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x80, 0x6, 0xffffffffffffffff, 0x1ff, 0xffff}}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{0x7fff, 0xf4, 0x8, 0x81}, {0x0, 0x1, 0x5, 0x5}, {0x6, 0x8}, {0x7, 0x3f, 0x3, 0x20}]}]}, {0xce, 0x6, "855fd36d5fbf4b97f887d4a83ee6f007e81a5d6acbeca688e71cbfc1b3a49e285641ce31ff30b5d1117db0ec01913ff4b463ba9a3a21c2c926578d89f5b8829cf43750205b69895126d34c4e59f20bffa047eb5f66c6df82e0f52d15541384f88647ea3bcdaf10716dd737fa5aa5149d127d5c5e95bd74dff1bed8ba89782ffd2e5487db917512d6ba3a87b46322e8af9556bcdde3f7bf15a07ff00d5ed853d5c9b012e5fdfe4349b5ef2924650736eb00b3fbe29f91af08506318505fc643ebb43b572fda76a19b9cb2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x13c, 0x17, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x8001}]}, @TCA_IFE_METALST={0x8, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}]}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}, @TCA_IFE_METALST={0x4}]}, {0xee, 0x6, "6897b5f56869eefe65006e43807537cdb812f53a283390f1104fec87c3d06baceda6f4c032e5b05fdb459d3614b00924c6b26528bcc1c66024a965af4582fe21ff605927b0abd911be75b759eb364b1165fd619f807990cb124d870065ba0c7f91268b7ba6e375e04d72be1f2424a54084bee2be50e246af695681f99494e70de1d64a7a2c0592fcad756854f598a1fb94a6937b02f9c182e7ea35a2b93a849f550b6bdee2656ddccd271108994c694d760a294a4f092a3b53f86a9ce501d9455ce75527162e1dfd62c39b08d3fa73ec2fc7d3fefcc9019771eb1c6b2fc2df91d8f17cf8e813dd5758d0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_ctinfo={0x134, 0x1e, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x200}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x5}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xf7}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0xffffffff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x4, 0x6, 0x8, 0x59, 0x20}}]}, {0xc6, 0x6, "de7a8dadf667570b311743ee464fb041e15f5a7469eed60460cf3f8a8a82f460a421a4a913696cdd8dd5a80e5e956547943777af649014e426675a956b0a22aeec990e5e3f08b192dead72f1d9d1aab54880ddc0eee5dcd86285ee82f2c713d68105d13ebda21ff0f86403ffec9825e7ff0bc072e8e23c09cc58ae56c80c93270a61c2cc44df9906d377c7db5b85fac5fa19ac37162821439fc33dca966798752e7daf62d1135143cf02294acc38416c59c54b9bc28443f3b74f75a69be95981bb26"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, {0x4b0, 0x1, [@m_gact={0x94, 0x15, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1e55, 0xfffffffffffffffe}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1419, 0x7}}]}, {0x4d, 0x6, "003a4e4bda6db60f10cb0b5e06657321ab1d65ac4e43f6408a1c908a09dd3be2ddc942d2103f4fe3feeb6fe2c0f3215b3052a449dc67eaa2c53056056818ea2f683067cb1aa7cdd364"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_sample={0x13c, 0x1f, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x881}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x54, 0x1, 0xa, 0x5, 0x81}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x4, 0x10000000, 0x7, 0x8001}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7fff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x2}, @TCA_SAMPLE_RATE={0x8}]}, {0xbf, 0x6, "90db76a2ef48568e453d9810e045ab461eb9b3e2336a9ba47c707e51aa8925cec12fdbe86aa4aaec51f684dbba8ce5858eea63d80955a9b9494524a866c58bd9f2bd19ac70bfeaf297b23fa032cb1a9c293e3101ea6fef1067a0a8bd60be35b63b091c8626af3a710c713403a451d1d978c9902645f2a26d24c8d48970c4ba373f41c3709a00841a4d1e61ff18e9f4f0dcd8748146c63195469f0b35d0b50b18f4e1e691c9cf7bd3da0a391788bce1d76fd7e0ce4750d202403084"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ctinfo={0xcc, 0x5, 0x0, 0x0, {{0xb}, {0x7c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x10001}, @TCA_CTINFO_ACT={0x18, 0x3, {0x7a9, 0x81, 0x3, 0x5, 0x4}}, @TCA_CTINFO_ACT={0x18, 0x3, {0x100, 0x0, 0x7, 0x2, 0x51fd}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x7fff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x2}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x81, 0x32c, 0x10000000, 0x7, 0x8}}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x80}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x916a}]}, {0x26, 0x6, "767e9cce973ca3a87314aff726d3ca024b9fcad50d223037b3cbb0430e297f0d6c62"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_ife={0x17c, 0x0, 0x0, 0x0, {{0x8}, {0x70, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x7dcb12f, 0x7f, 0x4, 0x80000000, 0xffffff90}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x8000}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}, @TCA_IFE_METALST={0x20, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x7}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x1}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x4}]}, {0xe7, 0x6, "3403cefbf7a55e78f1ac5550eab55796be4e2cb6027421c166dff20e60a33bb30eb71320aa48b32447a55385854f87f1785085e8cc1b7b748200c5881cf8108ac000b9e27753fe7c5daa53bd3e6d4ded4e9210af0745d2daa9d6d31320ebeb56be5c371d5a82f867504dd77097ec213c899fa40407316c63071f7b5437bb15d35ee2cee788a858773dac3258814bf0c48baa8b85026224da19b8e946d0f82989205652a483fe2248b1f09f0ebb1a9bb5123b743ffe87d23f6c64a938c0930bd6a8f942b4ccd5c067f99943fa16cde97ee7be27e1d30b2491a3b353da6aa3f8571fcc55"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x4}}}}, @m_ct={0x94, 0xd, 0x0, 0x0, {{0x7}, {0x4}, {0x6b, 0x6, "d9774ee2190510cc02a3936ce48a434beaf3f86df2e5f623e112f25055cade3df2d51bb8d685137e5f4e60aa9a63b3f4e126e16a90f79d951633263f87e30b885a8fe42f4fb519e882a316f2e4182beb6f4eef34bbb8782d481718b6289336d222c7f4029123f5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}, {0x474, 0x1, [@m_connmark={0x1f0, 0xd, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x6, 0x6, 0x4, 0xfffffffb}, 0x40}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9c, 0x3, 0x10000000, 0x1, 0x87b}, 0x31}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x1, 0x5, 0x9}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xa3, 0x5, 0x20000000, 0xfff, 0x7}, 0xff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x7fff, 0x20000000, 0x44bc, 0x2063d1}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7ad1, 0xffff, 0xffffffffffffffff, 0x3, 0xfffffffa}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0xfff, 0x10000000, 0x3}, 0x101}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x10001, 0x8, 0x4, 0x80, 0x401}}}]}, {0xdf, 0x6, "dbf6d210b0c965cbb52458a9944ed25c28f1d3275994d9b2a94f52b9b85bd2327d704e6eb463ae68d1225d993a199715af80a06d082aab46b52aa4741b51fe92827f041d15c09009cf129df6ee4b0cc3b1860ca710c804066ed5f74cc04e65e8f966f36d078258d39563a4548f532e810a1dc7f164fd4cd99c2b2ef10506e890e34194a1887d33b8306c7dfdd18e316e9bdd57fe8852b7628075786e0d68026902d21b38a63042daab89f8b31c61254b559c75e49d4d26f32a6fd09c9ad0535b78a77268628f5c1b57eb100964875e0ae886d176f7958aa0d084fd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0x168, 0xe, 0x0, 0x0, {{0x7}, {0x90, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @empty}, @TCA_CT_LABELS_MASK={0x14, 0x8, "8f9f45553abe59e6327763344ff35533"}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @empty}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}, @TCA_CT_ZONE={0x6, 0x4, 0x9}, @TCA_CT_LABELS={0x14, 0x7, "e77af0fe92510cc6ca3d5894b0bc37c7"}, @TCA_CT_MARK={0x8, 0x5, 0x2}, @TCA_CT_ACTION={0x6, 0x3, 0x2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}]}, {0xb1, 0x6, "b02b24be5c3fc3495be95303a15a8408a29ba675802d203585a7026577f929a24252ae14820536a63a5af950223c85a62f4295a1d8b60c31ae20ed9e5b320de0a70d38f2029c87bb2c480fcd728960618bffdb33e3bde0591493a114834adbf0915dfc247183bff69562ed4754da3559b751d071029f31093af0e619152e207bcae265c6ab29476a2fe941ceb7ceca23fe5721d033083d7dcba094100acb617bbb97c9c86792d99e9813fd0cc5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x118, 0x33, 0x0, 0x0, {{0xc}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x80000000}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xde, 0x1, 0x8, 0x1, 0x80000000}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0xab, 0x6, "3ba87b75723e28932e8eb4c79115f95ec4a0bfa0a7712ffbfa89ca8a2312e6909d1b33973e103960004039ef8732f0bc6e77113abb68abcbf52189fbb9e85993c7fef68cbc6626d73c99d04d8d51bbdd9d260e7884ce5760e41189e5cabb4c1e3ddd6e1e92a9fa8b0599b9c7d72eab5d610a56047e341256416495079d9cebcf0007bb81ee3a3c989e8b29760415a0c4d6193062a5257ffd9e94dcdf1ff17f4f5f3de588f0fa45"}, {0xc, 0x7, {0x0, 0x924f2b0b45899b99}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}, 0x21c4}, 0x1, 0x0, 0x0, 0x40000}, 0x45) sendmsg$nl_route_sched(r3, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) (async) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) (async) sendto$packet(r7, &(0x7f0000000580), 0x0, 0x841, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) 03:03:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff00000240ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000de8000da55aa", 0x40, 0x1c0}]) 03:03:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x9d8, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072f0300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3202.237983] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3202.267058] ldm_validate_privheads(): Disk read failed. [ 3202.277812] loop3: p2 p3 p4 03:03:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0xec0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072f8300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3202.283352] loop3: partition table partially beyond EOD, truncated [ 3202.307232] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3202.326946] loop2: p2 < > p3 p4 [ 3202.333041] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200380700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3202.367584] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3202.432295] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3202.470076] loop2: p4 size 3657466078 extends beyond EOD, truncated [ 3202.519172] loop5: p2 p3 p4 [ 3202.526334] loop3: p3 start 225 is beyond EOD, truncated [ 3202.542261] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3202.558236] loop5: p2 size 1074397184 extends beyond EOD, truncated [ 3202.661953] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3202.730791] 8021q: adding VLAN 0 to HW filter on device batadv4148 [ 3202.742202] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3202.783703] bond5060: Enslaving batadv4148 as a backup interface with an up link [ 3202.830732] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3202.861097] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3202.875373] loop5: p2 p3 p4 03:03:43 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000200024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003f0700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x200009f4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:43 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000001de8000da55aa", 0x40, 0x1c0}]) 03:03:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x10) sendmsg$nl_route_sched(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"/312], 0x138}, 0x1, 0x0, 0x0, 0x20000850}, 0x4048000) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000600)={&(0x7f0000000580), 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=@newtaction={0x21c4, 0x30, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [{0x139c, 0x1, [@m_sample={0x1080, 0x11, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18, 0x2, {0x7, 0xff, 0x1, 0x0, 0x2}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x100}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0xffff, 0x5113, 0x6, 0x9, 0x3ff}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0xfffffffa, 0x9, 0x5, 0x4}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ctinfo={0x90, 0x0, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x5c, 0x6, "a39c831a42d1c81ee586f884b6fb9d96c295d11b5d2e1531c9e9476acea52ae0b22215e0dbe43bacbd292a0e6bcbb34190e3376df22835815672491c6a745ba70cc1be80a52a3dbb0a224d307a6be98ff3589d1cd780d644"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0xf8, 0x8, 0x0, 0x0, {{0xb}, {0x7c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x7fffffff, 0xcaa9, 0x3, 0x6, 0x6}}, @TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x800, 0x4, 0x3}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x80, 0x4, 0x4, 0x1000}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x0, 0xc, 0x8, 0x574}}, @TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x51, 0x6, "f1db3c59969eebea618ff9de48bf66a4e64f91006336729d9f370928000251b37227730d646ac773d0e0aed8c7b92333ae559302534cb9d7aa9e8c41a332a38827fa8f5bbf241478ba9350e585"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x190, 0x0, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x2fb, 0x5, 0x7, 0xfff, 0x9}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x80000000, 0x3, 0x4, 0x8, 0xa2}, 0x1}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x20, 0x40, 0x8, 0x1ff}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x1f}, @TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa}, @TCA_IFE_TYPE={0x6, 0x5, 0xe9bf}]}, {0xe7, 0x6, "4765d59b8efdde98c5ba59aad5b09393b676845f9f44fa02f1ab95c2e02b044731ec7b49eac241811449f036304d3b0f5ce5036ba60c8188df7620b10e7c292201e23e9280351d6816b009d502c46b2cf2aa9a39678cc8d5d127b51a3ee4092277f0356b06632ed81e0d9261c12eb9e67fa8a1f2755d8c21a907c48e8993084c22bda91ce312f83d4998ebf373b227e8b0b8f9936538890f6dd7befaf8817e89a42a8dadc5683056838c794a063799c00667484b66dc99bb5710752e0fdf052bc45ffbbbe83d4b7369e8767d9a7b01b3a4639284f08bfce148812109a357075000ed2f"}, {0xc}, {0xc, 0x8, {0x3}}}}]}, {0x4f0, 0x1, [@m_gact={0xd4, 0x1b, 0x0, 0x0, {{0x9}, {0x94, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x23, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1000, 0x4, 0x8, 0x401, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xd1d, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1d22, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x20, 0x1, 0x0, 0x32}}, @TCA_GACT_PARMS={0x18, 0x2, {0x80, 0x6, 0x3, 0x64d62c03}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x18fb, 0x8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x101, 0x1, 0x20000000, 0x5, 0xffff}}]}, {0x18, 0x6, "3e2ce5180479fdc10fcdd9a9a73b5ac6d81801b2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_bpf={0x1a8, 0x14, 0x0, 0x0, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x101, 0x7, 0x10000000, 0x9, 0xff}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xe5e, 0x4, 0x2, 0x3, 0xee}}, @TCA_ACT_BPF_NAME={0xa, 0x6, './bus\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x8, 0x5, 0x7, 0xcec, 0xf4b}}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_FD={0x8, 0x5, r5}, @TCA_ACT_BPF_NAME={0x10, 0x6, './bus/file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x80, 0x6, 0xffffffffffffffff, 0x1ff, 0xffff}}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{0x7fff, 0xf4, 0x8, 0x81}, {0x0, 0x1, 0x5, 0x5}, {0x6, 0x8}, {0x7, 0x3f, 0x3, 0x20}]}]}, {0xce, 0x6, "855fd36d5fbf4b97f887d4a83ee6f007e81a5d6acbeca688e71cbfc1b3a49e285641ce31ff30b5d1117db0ec01913ff4b463ba9a3a21c2c926578d89f5b8829cf43750205b69895126d34c4e59f20bffa047eb5f66c6df82e0f52d15541384f88647ea3bcdaf10716dd737fa5aa5149d127d5c5e95bd74dff1bed8ba89782ffd2e5487db917512d6ba3a87b46322e8af9556bcdde3f7bf15a07ff00d5ed853d5c9b012e5fdfe4349b5ef2924650736eb00b3fbe29f91af08506318505fc643ebb43b572fda76a19b9cb2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x13c, 0x17, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x8001}]}, @TCA_IFE_METALST={0x8, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}]}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}, @TCA_IFE_METALST={0x4}]}, {0xee, 0x6, "6897b5f56869eefe65006e43807537cdb812f53a283390f1104fec87c3d06baceda6f4c032e5b05fdb459d3614b00924c6b26528bcc1c66024a965af4582fe21ff605927b0abd911be75b759eb364b1165fd619f807990cb124d870065ba0c7f91268b7ba6e375e04d72be1f2424a54084bee2be50e246af695681f99494e70de1d64a7a2c0592fcad756854f598a1fb94a6937b02f9c182e7ea35a2b93a849f550b6bdee2656ddccd271108994c694d760a294a4f092a3b53f86a9ce501d9455ce75527162e1dfd62c39b08d3fa73ec2fc7d3fefcc9019771eb1c6b2fc2df91d8f17cf8e813dd5758d0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_ctinfo={0x134, 0x1e, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x200}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x5}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xf7}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0xffffffff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x4, 0x6, 0x8, 0x59, 0x20}}]}, {0xc6, 0x6, "de7a8dadf667570b311743ee464fb041e15f5a7469eed60460cf3f8a8a82f460a421a4a913696cdd8dd5a80e5e956547943777af649014e426675a956b0a22aeec990e5e3f08b192dead72f1d9d1aab54880ddc0eee5dcd86285ee82f2c713d68105d13ebda21ff0f86403ffec9825e7ff0bc072e8e23c09cc58ae56c80c93270a61c2cc44df9906d377c7db5b85fac5fa19ac37162821439fc33dca966798752e7daf62d1135143cf02294acc38416c59c54b9bc28443f3b74f75a69be95981bb26"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, {0x4b0, 0x1, [@m_gact={0x94, 0x15, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1e55, 0xfffffffffffffffe}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1419, 0x7}}]}, {0x4d, 0x6, "003a4e4bda6db60f10cb0b5e06657321ab1d65ac4e43f6408a1c908a09dd3be2ddc942d2103f4fe3feeb6fe2c0f3215b3052a449dc67eaa2c53056056818ea2f683067cb1aa7cdd364"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_sample={0x13c, 0x1f, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x881}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x54, 0x1, 0xa, 0x5, 0x81}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x4, 0x10000000, 0x7, 0x8001}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7fff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x2}, @TCA_SAMPLE_RATE={0x8}]}, {0xbf, 0x6, "90db76a2ef48568e453d9810e045ab461eb9b3e2336a9ba47c707e51aa8925cec12fdbe86aa4aaec51f684dbba8ce5858eea63d80955a9b9494524a866c58bd9f2bd19ac70bfeaf297b23fa032cb1a9c293e3101ea6fef1067a0a8bd60be35b63b091c8626af3a710c713403a451d1d978c9902645f2a26d24c8d48970c4ba373f41c3709a00841a4d1e61ff18e9f4f0dcd8748146c63195469f0b35d0b50b18f4e1e691c9cf7bd3da0a391788bce1d76fd7e0ce4750d202403084"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ctinfo={0xcc, 0x5, 0x0, 0x0, {{0xb}, {0x7c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x10001}, @TCA_CTINFO_ACT={0x18, 0x3, {0x7a9, 0x81, 0x3, 0x5, 0x4}}, @TCA_CTINFO_ACT={0x18, 0x3, {0x100, 0x0, 0x7, 0x2, 0x51fd}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x7fff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x2}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x81, 0x32c, 0x10000000, 0x7, 0x8}}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x80}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x916a}]}, {0x26, 0x6, "767e9cce973ca3a87314aff726d3ca024b9fcad50d223037b3cbb0430e297f0d6c62"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_ife={0x17c, 0x0, 0x0, 0x0, {{0x8}, {0x70, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x7dcb12f, 0x7f, 0x4, 0x80000000, 0xffffff90}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x8000}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}, @TCA_IFE_METALST={0x20, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x7}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x1}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x4}]}, {0xe7, 0x6, "3403cefbf7a55e78f1ac5550eab55796be4e2cb6027421c166dff20e60a33bb30eb71320aa48b32447a55385854f87f1785085e8cc1b7b748200c5881cf8108ac000b9e27753fe7c5daa53bd3e6d4ded4e9210af0745d2daa9d6d31320ebeb56be5c371d5a82f867504dd77097ec213c899fa40407316c63071f7b5437bb15d35ee2cee788a858773dac3258814bf0c48baa8b85026224da19b8e946d0f82989205652a483fe2248b1f09f0ebb1a9bb5123b743ffe87d23f6c64a938c0930bd6a8f942b4ccd5c067f99943fa16cde97ee7be27e1d30b2491a3b353da6aa3f8571fcc55"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x4}}}}, @m_ct={0x94, 0xd, 0x0, 0x0, {{0x7}, {0x4}, {0x6b, 0x6, "d9774ee2190510cc02a3936ce48a434beaf3f86df2e5f623e112f25055cade3df2d51bb8d685137e5f4e60aa9a63b3f4e126e16a90f79d951633263f87e30b885a8fe42f4fb519e882a316f2e4182beb6f4eef34bbb8782d481718b6289336d222c7f4029123f5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}, {0x474, 0x1, [@m_connmark={0x1f0, 0xd, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x6, 0x6, 0x4, 0xfffffffb}, 0x40}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9c, 0x3, 0x10000000, 0x1, 0x87b}, 0x31}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x1, 0x5, 0x9}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xa3, 0x5, 0x20000000, 0xfff, 0x7}, 0xff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x7fff, 0x20000000, 0x44bc, 0x2063d1}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7ad1, 0xffff, 0xffffffffffffffff, 0x3, 0xfffffffa}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0xfff, 0x10000000, 0x3}, 0x101}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x10001, 0x8, 0x4, 0x80, 0x401}}}]}, {0xdf, 0x6, "dbf6d210b0c965cbb52458a9944ed25c28f1d3275994d9b2a94f52b9b85bd2327d704e6eb463ae68d1225d993a199715af80a06d082aab46b52aa4741b51fe92827f041d15c09009cf129df6ee4b0cc3b1860ca710c804066ed5f74cc04e65e8f966f36d078258d39563a4548f532e810a1dc7f164fd4cd99c2b2ef10506e890e34194a1887d33b8306c7dfdd18e316e9bdd57fe8852b7628075786e0d68026902d21b38a63042daab89f8b31c61254b559c75e49d4d26f32a6fd09c9ad0535b78a77268628f5c1b57eb100964875e0ae886d176f7958aa0d084fd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0x168, 0xe, 0x0, 0x0, {{0x7}, {0x90, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @empty}, @TCA_CT_LABELS_MASK={0x14, 0x8, "8f9f45553abe59e6327763344ff35533"}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @empty}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}, @TCA_CT_ZONE={0x6, 0x4, 0x9}, @TCA_CT_LABELS={0x14, 0x7, "e77af0fe92510cc6ca3d5894b0bc37c7"}, @TCA_CT_MARK={0x8, 0x5, 0x2}, @TCA_CT_ACTION={0x6, 0x3, 0x2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}]}, {0xb1, 0x6, "b02b24be5c3fc3495be95303a15a8408a29ba675802d203585a7026577f929a24252ae14820536a63a5af950223c85a62f4295a1d8b60c31ae20ed9e5b320de0a70d38f2029c87bb2c480fcd728960618bffdb33e3bde0591493a114834adbf0915dfc247183bff69562ed4754da3559b751d071029f31093af0e619152e207bcae265c6ab29476a2fe941ceb7ceca23fe5721d033083d7dcba094100acb617bbb97c9c86792d99e9813fd0cc5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x118, 0x33, 0x0, 0x0, {{0xc}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x80000000}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xde, 0x1, 0x8, 0x1, 0x80000000}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0xab, 0x6, "3ba87b75723e28932e8eb4c79115f95ec4a0bfa0a7712ffbfa89ca8a2312e6909d1b33973e103960004039ef8732f0bc6e77113abb68abcbf52189fbb9e85993c7fef68cbc6626d73c99d04d8d51bbdd9d260e7884ce5760e41189e5cabb4c1e3ddd6e1e92a9fa8b0599b9c7d72eab5d610a56047e341256416495079d9cebcf0007bb81ee3a3c989e8b29760415a0c4d6193062a5257ffd9e94dcdf1ff17f4f5f3de588f0fa45"}, {0xc, 0x7, {0x0, 0x924f2b0b45899b99}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}, 0x21c4}, 0x1, 0x0, 0x0, 0x40000}, 0x45) sendmsg$nl_route_sched(r3, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) sendto$packet(r7, &(0x7f0000000580), 0x0, 0x841, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) (async) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x10) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"/312], 0x138}, 0x1, 0x0, 0x0, 0x20000850}, 0x4048000) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000600)={&(0x7f0000000580), 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=@newtaction={0x21c4, 0x30, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [{0x139c, 0x1, [@m_sample={0x1080, 0x11, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18, 0x2, {0x7, 0xff, 0x1, 0x0, 0x2}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x100}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0xffff, 0x5113, 0x6, 0x9, 0x3ff}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0xfffffffa, 0x9, 0x5, 0x4}}]}, {0x1004, 0x6, "438bdeda2fca2e7f47938c56cb6802530b4c0d4a2d7bb58fe34fd954898a26d501e9fc56d61798091f29adf90654df6b41933c6826a0402502f35e87ad17b37724d3466b297153abc1ad009f5e3d759f04b4d52f29e58ba9bc1884803c951366e8f223453d3a8fcb172c9f6ea5bd6450255d6923359fa6c7482f05e591388c6eee30b89c816cb91b69bb1c885780a7be983978c036f64b6aa5d7bc59bc55c0dccda2ce3da05c00b4822c10b27b8c7de5f6e8ae9ab79f56c9d0f93af3ff654368d659a4310856cda5ac210165578f1980f956cedaa57e663bbab5f71a76af13b1793c6bcb25874d863093f5367d2d14ff76a68af108ca1fdeb44f5f413176cf3b1222e568432f7580ac0e9a598da5e2a65bbefd2a26c8cb184a12e7e226e057d11a1dd1894aa4f2fd73eec8ba78d16ab14574574947df165b728ac06cbd4aefe9a31bb956a43e69f758f84b8845e2c913cb00e1d970967e1ae0548f9b3e471de1d609dba598393e1ba96acba77f04d0de2ee6b479955ef7c5cb98bc41b6fb1fb2a6212a81afb3debe2517626f21d419f0dcd51ad5d6d4560c2c3133c5cf235b098885dfbbe01974cf809d1ea2b181739d4509b905356be1badc37ba40d09810998a4d993cada7e1e06587c2f16571deea3b64980a048d6c9c466e3b9390687022f224476fb068f532412c8f96157eb01f407b280052e233ae638f5b9261ba7e8f993d6e44defb65b2162da11156575467feab70d5d67cae8b7b7d046518584dec8054947f397fcd04d777bf5f11d49dc6bde47bd8c7cd8bb1eedc7f00dc6c937ff081d12f819c44bbf817865a605b231f2eff1e997d59e09d4ceaf14926b1fd0c9ea9da10a39e15c6ae6daa5b03409b282de35309204dc9216b82be5431a6dad1c72a3d8b912d6717ef7892c39596676145e38a5122efd8e0b1839f0f86d54c3ec422414346297f17b92cd0910344c360be5eb508a16bc330e8041e5a38c5e85c90694ff63fc537f9e77ca660fe34e835f7f371cfdb536f2a106a6d532af1e0cd1bf4011a77bea9d55862f793133727085c6be47d65fbd29a09fd864becd55a7ec10eb8c85c5296b5da7341d61edf9f747747d826e434c435ab5121a1769abf2ac0a3dd792ba3225bad7ce25bf432d846434f2f39fd9fba88b9cf92360f2586170229afa1601454bb45e412fd2ef06c09267a72daf9a07bf80b5758b8d030973542146862c8f2d98cace6447fef095758ca9bd401d96fb75fd99550d13b5b11b645ff6d9dad134b3c0f333c37269b5720461e73846aa789d9a1b0e44f0e857f0a7cff3a2f8f8be631d9fd0ce4f150e8183ea6fbb1d9c543606b49c70ed9202599699a034d42df876c9bb3ac9e5f08a4164245e3e454368b0292a4be5d5c1de68f5721752082b912944172d98e2844e2bca335c9d7efcdcbd5068b28c6b76f41af8e3b27c497d9cb5338279f38cd5f73a0887a14ee343e0d73ed95b4116e2e7829c2118485cdc51529bc6e4287135584fb8e59ade206983f68c9e91073c46554ca6a8abedfa2f3d2fbb54966a8b4c045c7922a29018393c3b84aa07674b7ac80054794bf51d55e539126ac69af0f259895e1b3e93ede777e550ab14c5dd73cf6d8ad5f1a0e80a7738ed799f561a6d821ce9ac1d7346b39c439198f3418a3b91b48a1184df520ae6381f1280b45ab31a5ae099b99b7887029331ccb473395ee5c87c119b79f50ef8cf1ce16a4cb4f7449527dbda3239b0b00f2ee5908dd4439d96b4080d07412bb4e7b7b246853f3c37e2c73e272980f5b9ac418e18160637482a6dee47810006fe48401d71d2c0b7acf000d4344c8305b0ab3575782d8feb6bb0409d87153b36b38f4ef94f5b24657646f1d33e15fd93cf0259429c16c78f3239fef907425a1b06e98cbc17c24abec6eb1364f0823db758edbf93b95527e0f3e07d64bf386541a499d2c8c7794535721f84d1fbaa3859994ffe2484ee04acf505938be2c15e201d22bd2ec0c4190af833927dc9918ad3b2f2d5e6acf04872def24f849633749bff40a1d2c8d62080fc341c314f247959ca76ed94ae0db754266e7c271fd61aa62fcd61a614a363ced472722961a900e074f66871ee8df26602b8f52ea5b5137e64810262b902f799c59208ab4053a1c9b95f02b5f7476d973cdfb2bad110223f68c74c125c573b04c8dc04dda9652d644cf50cdc9e6f64d3014399a119186a8b8c8a56703f5e1e0a2ccfe49edbcc58a3f6eca99aef151cf2ce7bc9193536319ebd131976db8eab05bafc7d5b96763f26c857523f3883493ed9bfced5d14a0fda6c8c603997363b2f1b0c782ea3a28c4618e3633e09ee5c2cc81e309d1a588699ac3516d25cf6135cfcadfb3e6a133ae21699c14e360d1a6e579edc3e5bc3b0b8036e476c51284c4cdf4824e214be7cb0c783faa93a0450e89150ad68265c7a6e92dce1b42faef010ed8489bacafdcd928b7068766be217332c5f5863da49b37829626ff7c808eb7482fc551291ec78afc2062a05a4334e895e4fb38d8a926e97f1d871836a41fa77e22d696c46499724d2aa84009585b610dd34fd9047ae74263369d667195356b968392f73e352c92a9aab7ff70e1391aba0e0d7e1a62cf81d8bae9ef0102e5144e595a9e032b63beb4b0ea1319ce1c5e33028eab4eca67d2d6f1874c401f93ae63eda940312544fb08591f1e857171196df6ba9ff33dee94fd567eca2892e43d273b9f16ea317ec459bf577b2f914854596fba6f270b43e31cb9345d91070bbd1496b03dcc0997b09a5c30200c18909303d5cacd42a7a00114aaa4cc2128f49d3081622a9126eb613ae90f16692344be51671107c7c292ddab548af393a74ed1f66cecd21f5652d667aff590ce8107bba76c270fb46168867f063d8e2ebc4c44abd7a70f2a203fc290eef7d1f8121a620e66e54894260ffc6f2344098b3f9548a934f6e5f49489ef91c9bdbb4e51bc959626d57c528f6c13dbb9d0e2909f5ad574da98c184557f6a17c8e6496377db59e2498407af064f5a4b29720fd88c7f68ebf44f6942a0a1aca226be5133376cc4c39d88bbd1b7cdfdc4adc12313675113e56c3fa75bb9c82d02c7ef2cbc7a621125e3cd32694e4a6a958b57c5331942a304204473d68afeaf6991dd28e6c59bf95910830d516c073e78605fc9936fca8243ca57b4076a6c01904bdd846a07ebc01e138a33cf199085248c5635e6cb581388301af8a8fb70b44647696d54654d334be42fd28e5b62d20d4c26baa35245d5b029bb485b9b2d74ffbfb0d12f73cbd559b6ad2a75f2c629ef5e0a3acbe814283b560191f870ff38b476aaabc8adb2c80e9ebb338990cc0b86b7c83a3bdd0804c55c77ff9b191a68333d5a2b26c487f0ba7012716baa3eff889ee11dee831f5a7bb8e0496c49799c84f3697b6834ee8c3b3bcd53e329e204e23f8d30e668a203475594c6f0fe4a76a87bad31044d810b22f2ea59092a3ba1e8ecb6f12ea18eb16a7f81d15dcd0dff1b809e7094507876a593cc923e3e5dd4a0f0de1d477974ffe60351b43296680f98987fe53a05893778fd694bf2f5fe69580e1506174f4512fcbd2975644eddea457c0786c62e20b282429f4104ebde8c6d7ba5fa75602362cafb21fcdb260bfc2e3e6c33d233e549aa7af6fdf0fb9d411ea38bd2f92410fb57bbe03f5160530112ff75745d10a665904c5dc9548a4dab8c3e6a3e53177ea834fb70db8adb6733bb7b4897bb4399b071ec6b2b6003a09a6e70cc88e7720933c7617f3d91ab6ccfed8070d93008e62ec1600074707c45e8bfc9fdf5bafe7c97c13120c2e86c1973cea0fbdc81a3fe39291dd2e6565c112530785e3dd05f23f6e5bab46eaf88955269ce351a6909fb70faef8731d7ad2758288d8f77fc13b8646af5fc0f32dfeafffb5f421155b43d389c6ebe226c00932cbd59bb924c8b196ea4b8a5c504ba230030483ad28079616af6c9f093c4afb973769d423ba009d224d2c7b676cc029b481e4ba38bc010597c734d087268e364845d8e0700a29cb62913022efe675cfc2d8cfb28f6dae4e42f0fe1efb058e1e5788d69345b3fb6242f96aa4506c4c43e94f2f6acbea3a14bc98c64cdff36ecae757fe236ebe9011949d92c35c6c78d789f591f42fbfcb34862ea758bf42f57d45b2ef7bb3cc144312184c2f2f9e46fb4f95f6a75c5a26dc68b367c65a953b4789f2b96da37b98aa7c395a11c6e0070c544628ba48402584fdd66f82c2019ed881ef14aeb249d88647629db38f47a5149ac4c9208f8abeba0f49f3848df3915e3cd3f89902979f7b8858d3035ae21b6773ba86a8bc0e0ce963b618f12aff03f5b0bede73969740f2acbea779a4e60d1aed4f3140dd68b197f78b79f59f4b429d73b39fc69ea0534104080c4023b08d1f2fd1cdc7441052bd42f277c4d20f465c6553ba2023f4520f7e0ec385753ff36cb2bf494effb8a5f68a77236ec49f2a351ac0f98f1211ec70315c4ae60a92541e9dcb3ec15081fcf4ac3c3d02926c264cf9643e5f23b200daf9f1ecbb4dc548259e65ba36b184d68aac16ee28c4683321a4138c9a8c8dd2016fa86a758ef85bae8341a742d957b523a19b001cc7d71a10b34b52e148cf70b8c173fe636bdcc85bd759e61241c2c83b625d72a4fa970c03909754a87c3f628826125c0fa314c5289b16d3a6512cc7830e2a260178b0b32dca8b406a85b1f03c57cf616fdc1388592c5d92301a2736f8025bb72a872fb882ad761838c0ae9437de96db3ae8cd39f29d29b7b0dbe9f436dacaf3ee76f3b9bfdaf56d86fc1cc1e9a78e7cc4151db1766f79d767482b9a78aedaaddcc1b03b8aa41c836d090055c843b6e28acb84b8deb6ff7b223b13277437663cc20c88c8ac6466abaecb8a5d6f95dc5f2ce9182bf915c926bdbcd20043cbe810d7b0dbe3afae64f8fffabcf7197406cb3e9500bc1c60d37e4874c6928eaa35f54a68edc332f6817505f1797949b1445e6c7940be9406554f72a103f3f6e768ccadb6515a0e0eb6d599ee5605ea53be8c923341824b99973eb102a30bcb4b8de8b694de6c5f1b54848721e9d743cc683bece18fcd1773e34588aaab46fe12b75223617afc0a48310c5479f2bd7e5a900f46623c34534776a697b38f589371d21b693e7a2b76c685b2ba486b557c8fbdde4ed0826b3d6a61ae1984f8f635afc07f97c3191362253ded7dfe891e4727565452b2cedb28d9e56d60c5ba984d53bdbc71d61e222c9246b609d29e642b8c43b650728997f87e323dffbf1e47a0520da1313c2f74914cdff94ab21ed18e529f7d8607b448a66ef7b3f8b890a38180a7658fcdbf35c6dd6a62906a6136c3eae51bffecccfc50fe2542d597fe6e1575fe46f0c8af8da80844a47334a1defdf8c4141a730e86e873c8fd972eb4e0a1f131e740fa6663366f2621cb3ed4a47b73a60367aef08cff90c2976deed71d88decc7503b40b907052c6d48e481b640862012ace0029c6c3542e534e17323e2fcbdd4509dd6e3fd4eaac1f12c726178eb5ddd1ce8e0392b69daa3c13e70fee63a6a5bf56ff93b025c8aacc23db85355e0501205bbb4b723fcfb77e079535811092ee70db726b51889ee21e3e1f69e266e42ef8953f1000bf5649f781e3d6c54ef670322d443c4972edebb92a0c8107ff3eded1c64eed95d40b244731664c878059006c3f46434eecb2e254bcf90e68e74873323114868decc6589c9db381d57e3a17b71888a57960b7a9d41e5ff56df3e1d51b2008f498a3713ef2614544f59ad6099bd4f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ctinfo={0x90, 0x0, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x5c, 0x6, "a39c831a42d1c81ee586f884b6fb9d96c295d11b5d2e1531c9e9476acea52ae0b22215e0dbe43bacbd292a0e6bcbb34190e3376df22835815672491c6a745ba70cc1be80a52a3dbb0a224d307a6be98ff3589d1cd780d644"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0xf8, 0x8, 0x0, 0x0, {{0xb}, {0x7c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x7fffffff, 0xcaa9, 0x3, 0x6, 0x6}}, @TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x800, 0x4, 0x3}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x80, 0x4, 0x4, 0x1000}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x0, 0xc, 0x8, 0x574}}, @TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x51, 0x6, "f1db3c59969eebea618ff9de48bf66a4e64f91006336729d9f370928000251b37227730d646ac773d0e0aed8c7b92333ae559302534cb9d7aa9e8c41a332a38827fa8f5bbf241478ba9350e585"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x190, 0x0, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x2fb, 0x5, 0x7, 0xfff, 0x9}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x80000000, 0x3, 0x4, 0x8, 0xa2}, 0x1}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x20, 0x40, 0x8, 0x1ff}}}, @TCA_IFE_TYPE={0x6, 0x5, 0x1f}, @TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa}, @TCA_IFE_TYPE={0x6, 0x5, 0xe9bf}]}, {0xe7, 0x6, "4765d59b8efdde98c5ba59aad5b09393b676845f9f44fa02f1ab95c2e02b044731ec7b49eac241811449f036304d3b0f5ce5036ba60c8188df7620b10e7c292201e23e9280351d6816b009d502c46b2cf2aa9a39678cc8d5d127b51a3ee4092277f0356b06632ed81e0d9261c12eb9e67fa8a1f2755d8c21a907c48e8993084c22bda91ce312f83d4998ebf373b227e8b0b8f9936538890f6dd7befaf8817e89a42a8dadc5683056838c794a063799c00667484b66dc99bb5710752e0fdf052bc45ffbbbe83d4b7369e8767d9a7b01b3a4639284f08bfce148812109a357075000ed2f"}, {0xc}, {0xc, 0x8, {0x3}}}}]}, {0x4f0, 0x1, [@m_gact={0xd4, 0x1b, 0x0, 0x0, {{0x9}, {0x94, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x23, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1000, 0x4, 0x8, 0x401, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xd1d, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1d22, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x20, 0x1, 0x0, 0x32}}, @TCA_GACT_PARMS={0x18, 0x2, {0x80, 0x6, 0x3, 0x64d62c03}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x18fb, 0x8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x101, 0x1, 0x20000000, 0x5, 0xffff}}]}, {0x18, 0x6, "3e2ce5180479fdc10fcdd9a9a73b5ac6d81801b2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_bpf={0x1a8, 0x14, 0x0, 0x0, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x101, 0x7, 0x10000000, 0x9, 0xff}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xe5e, 0x4, 0x2, 0x3, 0xee}}, @TCA_ACT_BPF_NAME={0xa, 0x6, './bus\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x8, 0x5, 0x7, 0xcec, 0xf4b}}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_FD={0x8, 0x5, r5}, @TCA_ACT_BPF_NAME={0x10, 0x6, './bus/file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x80, 0x6, 0xffffffffffffffff, 0x1ff, 0xffff}}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{0x7fff, 0xf4, 0x8, 0x81}, {0x0, 0x1, 0x5, 0x5}, {0x6, 0x8}, {0x7, 0x3f, 0x3, 0x20}]}]}, {0xce, 0x6, "855fd36d5fbf4b97f887d4a83ee6f007e81a5d6acbeca688e71cbfc1b3a49e285641ce31ff30b5d1117db0ec01913ff4b463ba9a3a21c2c926578d89f5b8829cf43750205b69895126d34c4e59f20bffa047eb5f66c6df82e0f52d15541384f88647ea3bcdaf10716dd737fa5aa5149d127d5c5e95bd74dff1bed8ba89782ffd2e5487db917512d6ba3a87b46322e8af9556bcdde3f7bf15a07ff00d5ed853d5c9b012e5fdfe4349b5ef2924650736eb00b3fbe29f91af08506318505fc643ebb43b572fda76a19b9cb2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x13c, 0x17, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x8001}]}, @TCA_IFE_METALST={0x8, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}]}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}, @TCA_IFE_METALST={0x4}]}, {0xee, 0x6, "6897b5f56869eefe65006e43807537cdb812f53a283390f1104fec87c3d06baceda6f4c032e5b05fdb459d3614b00924c6b26528bcc1c66024a965af4582fe21ff605927b0abd911be75b759eb364b1165fd619f807990cb124d870065ba0c7f91268b7ba6e375e04d72be1f2424a54084bee2be50e246af695681f99494e70de1d64a7a2c0592fcad756854f598a1fb94a6937b02f9c182e7ea35a2b93a849f550b6bdee2656ddccd271108994c694d760a294a4f092a3b53f86a9ce501d9455ce75527162e1dfd62c39b08d3fa73ec2fc7d3fefcc9019771eb1c6b2fc2df91d8f17cf8e813dd5758d0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_ctinfo={0x134, 0x1e, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x200}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x5}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xf7}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0xffffffff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x4, 0x6, 0x8, 0x59, 0x20}}]}, {0xc6, 0x6, "de7a8dadf667570b311743ee464fb041e15f5a7469eed60460cf3f8a8a82f460a421a4a913696cdd8dd5a80e5e956547943777af649014e426675a956b0a22aeec990e5e3f08b192dead72f1d9d1aab54880ddc0eee5dcd86285ee82f2c713d68105d13ebda21ff0f86403ffec9825e7ff0bc072e8e23c09cc58ae56c80c93270a61c2cc44df9906d377c7db5b85fac5fa19ac37162821439fc33dca966798752e7daf62d1135143cf02294acc38416c59c54b9bc28443f3b74f75a69be95981bb26"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, {0x4b0, 0x1, [@m_gact={0x94, 0x15, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1e55, 0xfffffffffffffffe}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1419, 0x7}}]}, {0x4d, 0x6, "003a4e4bda6db60f10cb0b5e06657321ab1d65ac4e43f6408a1c908a09dd3be2ddc942d2103f4fe3feeb6fe2c0f3215b3052a449dc67eaa2c53056056818ea2f683067cb1aa7cdd364"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_sample={0x13c, 0x1f, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x881}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x54, 0x1, 0xa, 0x5, 0x81}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x4, 0x10000000, 0x7, 0x8001}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7fff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x2}, @TCA_SAMPLE_RATE={0x8}]}, {0xbf, 0x6, "90db76a2ef48568e453d9810e045ab461eb9b3e2336a9ba47c707e51aa8925cec12fdbe86aa4aaec51f684dbba8ce5858eea63d80955a9b9494524a866c58bd9f2bd19ac70bfeaf297b23fa032cb1a9c293e3101ea6fef1067a0a8bd60be35b63b091c8626af3a710c713403a451d1d978c9902645f2a26d24c8d48970c4ba373f41c3709a00841a4d1e61ff18e9f4f0dcd8748146c63195469f0b35d0b50b18f4e1e691c9cf7bd3da0a391788bce1d76fd7e0ce4750d202403084"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ctinfo={0xcc, 0x5, 0x0, 0x0, {{0xb}, {0x7c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x10001}, @TCA_CTINFO_ACT={0x18, 0x3, {0x7a9, 0x81, 0x3, 0x5, 0x4}}, @TCA_CTINFO_ACT={0x18, 0x3, {0x100, 0x0, 0x7, 0x2, 0x51fd}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x7fff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x2}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x81, 0x32c, 0x10000000, 0x7, 0x8}}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x80}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x916a}]}, {0x26, 0x6, "767e9cce973ca3a87314aff726d3ca024b9fcad50d223037b3cbb0430e297f0d6c62"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_ife={0x17c, 0x0, 0x0, 0x0, {{0x8}, {0x70, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x7dcb12f, 0x7f, 0x4, 0x80000000, 0xffffff90}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x8000}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}, @TCA_IFE_METALST={0x20, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x7}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x1}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x4}]}, {0xe7, 0x6, "3403cefbf7a55e78f1ac5550eab55796be4e2cb6027421c166dff20e60a33bb30eb71320aa48b32447a55385854f87f1785085e8cc1b7b748200c5881cf8108ac000b9e27753fe7c5daa53bd3e6d4ded4e9210af0745d2daa9d6d31320ebeb56be5c371d5a82f867504dd77097ec213c899fa40407316c63071f7b5437bb15d35ee2cee788a858773dac3258814bf0c48baa8b85026224da19b8e946d0f82989205652a483fe2248b1f09f0ebb1a9bb5123b743ffe87d23f6c64a938c0930bd6a8f942b4ccd5c067f99943fa16cde97ee7be27e1d30b2491a3b353da6aa3f8571fcc55"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x4}}}}, @m_ct={0x94, 0xd, 0x0, 0x0, {{0x7}, {0x4}, {0x6b, 0x6, "d9774ee2190510cc02a3936ce48a434beaf3f86df2e5f623e112f25055cade3df2d51bb8d685137e5f4e60aa9a63b3f4e126e16a90f79d951633263f87e30b885a8fe42f4fb519e882a316f2e4182beb6f4eef34bbb8782d481718b6289336d222c7f4029123f5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}, {0x474, 0x1, [@m_connmark={0x1f0, 0xd, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x6, 0x6, 0x4, 0xfffffffb}, 0x40}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9c, 0x3, 0x10000000, 0x1, 0x87b}, 0x31}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x1, 0x5, 0x9}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xa3, 0x5, 0x20000000, 0xfff, 0x7}, 0xff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x7fff, 0x20000000, 0x44bc, 0x2063d1}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7ad1, 0xffff, 0xffffffffffffffff, 0x3, 0xfffffffa}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0xfff, 0x10000000, 0x3}, 0x101}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x10001, 0x8, 0x4, 0x80, 0x401}}}]}, {0xdf, 0x6, "dbf6d210b0c965cbb52458a9944ed25c28f1d3275994d9b2a94f52b9b85bd2327d704e6eb463ae68d1225d993a199715af80a06d082aab46b52aa4741b51fe92827f041d15c09009cf129df6ee4b0cc3b1860ca710c804066ed5f74cc04e65e8f966f36d078258d39563a4548f532e810a1dc7f164fd4cd99c2b2ef10506e890e34194a1887d33b8306c7dfdd18e316e9bdd57fe8852b7628075786e0d68026902d21b38a63042daab89f8b31c61254b559c75e49d4d26f32a6fd09c9ad0535b78a77268628f5c1b57eb100964875e0ae886d176f7958aa0d084fd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0x168, 0xe, 0x0, 0x0, {{0x7}, {0x90, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @empty}, @TCA_CT_LABELS_MASK={0x14, 0x8, "8f9f45553abe59e6327763344ff35533"}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @empty}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}, @TCA_CT_ZONE={0x6, 0x4, 0x9}, @TCA_CT_LABELS={0x14, 0x7, "e77af0fe92510cc6ca3d5894b0bc37c7"}, @TCA_CT_MARK={0x8, 0x5, 0x2}, @TCA_CT_ACTION={0x6, 0x3, 0x2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}]}, {0xb1, 0x6, "b02b24be5c3fc3495be95303a15a8408a29ba675802d203585a7026577f929a24252ae14820536a63a5af950223c85a62f4295a1d8b60c31ae20ed9e5b320de0a70d38f2029c87bb2c480fcd728960618bffdb33e3bde0591493a114834adbf0915dfc247183bff69562ed4754da3559b751d071029f31093af0e619152e207bcae265c6ab29476a2fe941ceb7ceca23fe5721d033083d7dcba094100acb617bbb97c9c86792d99e9813fd0cc5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x118, 0x33, 0x0, 0x0, {{0xc}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x80000000}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xde, 0x1, 0x8, 0x1, 0x80000000}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0xab, 0x6, "3ba87b75723e28932e8eb4c79115f95ec4a0bfa0a7712ffbfa89ca8a2312e6909d1b33973e103960004039ef8732f0bc6e77113abb68abcbf52189fbb9e85993c7fef68cbc6626d73c99d04d8d51bbdd9d260e7884ce5760e41189e5cabb4c1e3ddd6e1e92a9fa8b0599b9c7d72eab5d610a56047e341256416495079d9cebcf0007bb81ee3a3c989e8b29760415a0c4d6193062a5257ffd9e94dcdf1ff17f4f5f3de588f0fa45"}, {0xc, 0x7, {0x0, 0x924f2b0b45899b99}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}, 0x21c4}, 0x1, 0x0, 0x0, 0x40000}, 0x45) (async) sendmsg$nl_route_sched(r3, 0x0, 0x0) (async) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) (async) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) (async) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) (async) sendto$packet(r7, &(0x7f0000000580), 0x0, 0x841, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) (async) 03:03:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a0000007645ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3202.878935] loop5: p2 size 1074397184 extends beyond EOD, truncated [ 3202.893498] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3202.902730] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x7ffff000, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200460700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3202.943338] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:03:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200470700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3203.039072] ldm_validate_privheads(): Disk read failed. [ 3203.046366] loop3: p2 p3 p4 [ 3203.068179] loop3: partition table partially beyond EOD, truncated [ 3203.078975] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3203.125792] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3203.140844] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3203.150824] loop5: p2 p3 p4 [ 3203.150882] loop2: p2 < > p3 p4 [ 3203.166313] loop5: p2 size 1073872898 extends beyond EOD, truncated 03:03:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007203e00700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3203.181486] loop2: partition table partially beyond EOD, truncated [ 3203.198823] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3203.257781] loop3: p3 start 225 is beyond EOD, truncated [ 3203.269353] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3203.273835] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0xfffffdef, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3203.318054] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3203.329499] loop2: p4 start 16777216 is beyond EOD, truncated [ 3203.339008] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:43 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00ffffffe48000da55aa", 0x40, 0x1c0}]) [ 3203.434722] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3203.465438] 8021q: adding VLAN 0 to HW filter on device batadv4149 [ 3203.480504] loop5: p2 p3 p4 [ 3203.500009] loop5: p2 size 1073872898 extends beyond EOD, truncated [ 3203.558956] bond5061: Enslaving batadv4149 as a backup interface with an up link [ 3203.573952] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3203.617209] loop2: p2 < > p3 p4 [ 3203.620952] loop2: partition table partially beyond EOD, truncated [ 3203.631322] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3203.655887] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3203.693754] loop2: p4 start 4294967040 is beyond EOD, truncated 03:03:44 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000300024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007201fc0700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x2, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000001fc45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3203.836945] 8021q: adding VLAN 0 to HW filter on device batadv4150 [ 3203.873282] bond5061: Enslaving batadv4150 as a backup interface with an up link 03:03:44 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000001ea8000da55aa", 0x40, 0x1c0}]) 03:03:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5ebc9dc2dcb11b6c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd2d, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb70000000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0xa, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, 0x0, 0x4800) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10468}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44030}, 0x1) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000956b051c049445e0c3c0c93112283a534ffc429d8d75db945b40e543ee56eb1514ea42cfcd1bdf658422f945c094637731cdd218857a9f7a3942598bab3afc9339aa00d9faa5cf801ac3d7e2c256"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x8400, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'geneve0\x00', 0x0}) bind$packet(r8, &(0x7f0000000040)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r7, &(0x7f0000001c00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001bc0)={&(0x7f00000004c0)=@newchain={0x16f8, 0x64, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xf, 0xf}, {0x8, 0xfff1}, {0x9, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x16bc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}, @TCA_MATCHALL_ACT={0xf0, 0x2, [@m_vlan={0xec, 0x9, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}]}, {0xad, 0x6, "ac0266a045d7b806131ff34a9266aa4c191f9cfea27f829f0a5ebdd5f4c0675951c2c2e6eafe47e19e5bd9c2b03ff3af8b99039645523d30c341fa77a09a8db8a80911c3832af9d6edabe920e5eaf31379ab7e36ec82ff58bfcd6060138211171a6a14e41b8002e426d0587a8318d1fddb4c609c144b910891e7410dced32b3704d50c54dfbf9d9bf433ba01f9d9aaae1313f70fdbca5fed3e069352ff931e29ba495d6ad97e4cd76e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_ACT={0x13d0, 0x2, [@m_mirred={0x174, 0x6, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x2d3, 0x0, 0x400, 0x800}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x1, 0xffffffffffffffff, 0x8}, 0x97c98fa747f7e3ba, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x81, 0x4, 0x7, 0x1}, 0x2, r10}}]}, {0xe6, 0x6, "519f8b97e97f55fe911ab10f5d39386372d0df8dad19af444e648e3c0c4111fe081ced2a75e460807431afdd9ab3c906e81ab2f38291e4cdb81726902d90e1ae815d1c642c06e136c0deaddad897be726f63eb89f5199aac9b635b9876f99426ec8d8426f0d13ac9716b9cb4a76436de8069dc7f0ee0a4f3b08c7b4327d9f3ab4e911e5b3b8f272021235591560dd7033c36a682579df8c1508586ddd8765d125c38411e828894c457742c7e4602922ffcd1760780a884bcec4652ed9fcb851bc11a61e3030db4fc8588e13b915dad5044e7bfecbeef204ad11bdd7fe0b5796b04af"}, {0xc}, {0xc, 0x8, {0x4, 0x3}}}}, @m_ife={0x74, 0x13, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_TYPE={0x6, 0x5, 0x5}, @TCA_IFE_DMAC={0xa, 0x3, @local}]}, {0x23, 0x6, "ea9d79d15e82824b755fe035eed295dd5d8114513aa1047f01628d06d55131"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_xt={0x9c, 0xc, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}]}, {0x69, 0x6, "e40a84cf51f35a17c05a710295ea376ebb57e15e0fb73b6b36c6473f5f39f85a0683f59cedbccd75faeaa6f22214b1ae5d1487595b3d6018d25dafa300fbc456e7feeb31fc34505a332ce517eac74736c72bbcefee38abe20b304fb967e380014303fd0e46"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_xt={0xc0, 0xd, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x46, 0x6, "311de6d71701f896f9b49f6d17b28ae32b5aa81b21d8174072217446016a50cbbbb58e5f9bc66948221001a08c287639055ffef55ce8632e969051e40e717c94740b"}, {0xc}, {0xc, 0x8, {0x7, 0x2}}}}, @m_mpls={0x1088, 0x14, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0xff, 0x5, 0x7, 0x200, 0x1}, 0x3}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xce5e, 0xff, 0x3, 0x4, 0x101}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4ef15}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_MATCHALL_ACT={0x1d0, 0x2, [@m_vlan={0x90, 0x3, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x880}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x80000000, 0x7, 0x685, 0x1b89c000}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e0}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5e8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x28, 0x6, "1a988d3816b16d4ee7c584cf6c3c617924ba681c984ca5397ae8cac2fdfa24a81c34211d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x13c, 0x8, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xd9, 0x6, "679d2b9123fc7fb8af12d0f7db65d42e1debcbcf7ccf221302632dd0a57d3e756a7c3984a6c3094dc2314385f0386c27a8b4164eec8ee6297a940a163e90491639bb6189d934f2ae3103e8f475e3d284209709c9ef346071bd9b7065064fad5b5647fac2d4b93455f620d60961930eb74fb118543e7e7b3bd6303906d10fb1e929e560e545c06762c3fdce87e29d6d1d47f2f8657db787d40e6384b4f77e4b14609e6e7c08e53e1a058924730f79765c765e52a9006bbd7e73c2fe4a029a4bf6252c92af3700a85208014c785063a56bffcbe04ff7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x4, 0xfff1}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x3}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x16f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x4002001) 03:03:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072000a0700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x3, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200230700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5ebc9dc2dcb11b6c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd2d, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb70000000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0xa, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, 0x0, 0x4800) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10468}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44030}, 0x1) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000956b051c049445e0c3c0c93112283a534ffc429d8d75db945b40e543ee56eb1514ea42cfcd1bdf658422f945c094637731cdd218857a9f7a3942598bab3afc9339aa00d9faa5cf801ac3d7e2c256"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x8400, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'geneve0\x00', 0x0}) bind$packet(r8, &(0x7f0000000040)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r7, &(0x7f0000001c00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001bc0)={&(0x7f00000004c0)=@newchain={0x16f8, 0x64, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xf, 0xf}, {0x8, 0xfff1}, {0x9, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x16bc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}, @TCA_MATCHALL_ACT={0xf0, 0x2, [@m_vlan={0xec, 0x9, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}]}, {0xad, 0x6, "ac0266a045d7b806131ff34a9266aa4c191f9cfea27f829f0a5ebdd5f4c0675951c2c2e6eafe47e19e5bd9c2b03ff3af8b99039645523d30c341fa77a09a8db8a80911c3832af9d6edabe920e5eaf31379ab7e36ec82ff58bfcd6060138211171a6a14e41b8002e426d0587a8318d1fddb4c609c144b910891e7410dced32b3704d50c54dfbf9d9bf433ba01f9d9aaae1313f70fdbca5fed3e069352ff931e29ba495d6ad97e4cd76e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_ACT={0x13d0, 0x2, [@m_mirred={0x174, 0x6, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x2d3, 0x0, 0x400, 0x800}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x1, 0xffffffffffffffff, 0x8}, 0x97c98fa747f7e3ba, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x81, 0x4, 0x7, 0x1}, 0x2, r10}}]}, {0xe6, 0x6, "519f8b97e97f55fe911ab10f5d39386372d0df8dad19af444e648e3c0c4111fe081ced2a75e460807431afdd9ab3c906e81ab2f38291e4cdb81726902d90e1ae815d1c642c06e136c0deaddad897be726f63eb89f5199aac9b635b9876f99426ec8d8426f0d13ac9716b9cb4a76436de8069dc7f0ee0a4f3b08c7b4327d9f3ab4e911e5b3b8f272021235591560dd7033c36a682579df8c1508586ddd8765d125c38411e828894c457742c7e4602922ffcd1760780a884bcec4652ed9fcb851bc11a61e3030db4fc8588e13b915dad5044e7bfecbeef204ad11bdd7fe0b5796b04af"}, {0xc}, {0xc, 0x8, {0x4, 0x3}}}}, @m_ife={0x74, 0x13, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_TYPE={0x6, 0x5, 0x5}, @TCA_IFE_DMAC={0xa, 0x3, @local}]}, {0x23, 0x6, "ea9d79d15e82824b755fe035eed295dd5d8114513aa1047f01628d06d55131"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_xt={0x9c, 0xc, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}]}, {0x69, 0x6, "e40a84cf51f35a17c05a710295ea376ebb57e15e0fb73b6b36c6473f5f39f85a0683f59cedbccd75faeaa6f22214b1ae5d1487595b3d6018d25dafa300fbc456e7feeb31fc34505a332ce517eac74736c72bbcefee38abe20b304fb967e380014303fd0e46"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_xt={0xc0, 0xd, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x46, 0x6, "311de6d71701f896f9b49f6d17b28ae32b5aa81b21d8174072217446016a50cbbbb58e5f9bc66948221001a08c287639055ffef55ce8632e969051e40e717c94740b"}, {0xc}, {0xc, 0x8, {0x7, 0x2}}}}, @m_mpls={0x1088, 0x14, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0xff, 0x5, 0x7, 0x200, 0x1}, 0x3}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xce5e, 0xff, 0x3, 0x4, 0x101}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4ef15}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_MATCHALL_ACT={0x1d0, 0x2, [@m_vlan={0x90, 0x3, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x880}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x80000000, 0x7, 0x685, 0x1b89c000}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e0}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5e8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x28, 0x6, "1a988d3816b16d4ee7c584cf6c3c617924ba681c984ca5397ae8cac2fdfa24a81c34211d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x13c, 0x8, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xd9, 0x6, "679d2b9123fc7fb8af12d0f7db65d42e1debcbcf7ccf221302632dd0a57d3e756a7c3984a6c3094dc2314385f0386c27a8b4164eec8ee6297a940a163e90491639bb6189d934f2ae3103e8f475e3d284209709c9ef346071bd9b7065064fad5b5647fac2d4b93455f620d60961930eb74fb118543e7e7b3bd6303906d10fb1e929e560e545c06762c3fdce87e29d6d1d47f2f8657db787d40e6384b4f77e4b14609e6e7c08e53e1a058924730f79765c765e52a9006bbd7e73c2fe4a029a4bf6252c92af3700a85208014c785063a56bffcbe04ff7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x4, 0xfff1}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x3}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x16f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x4002001) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5ebc9dc2dcb11b6c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd2d, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc4) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb70000000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0xa, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r0, 0x0, 0x4800) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10468}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44030}, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000956b051c049445e0c3c0c93112283a534ffc429d8d75db945b40e543ee56eb1514ea42cfcd1bdf658422f945c094637731cdd218857a9f7a3942598bab3afc9339aa00d9faa5cf801ac3d7e2c256"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x8400, 0x0) (async) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'geneve0\x00'}) (async) bind$packet(r8, &(0x7f0000000040)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @dev}, 0x14) (async) sendmsg$nl_route_sched(r7, &(0x7f0000001c00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001bc0)={&(0x7f00000004c0)=@newchain={0x16f8, 0x64, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xf, 0xf}, {0x8, 0xfff1}, {0x9, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x16bc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}, @TCA_MATCHALL_ACT={0xf0, 0x2, [@m_vlan={0xec, 0x9, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}]}, {0xad, 0x6, "ac0266a045d7b806131ff34a9266aa4c191f9cfea27f829f0a5ebdd5f4c0675951c2c2e6eafe47e19e5bd9c2b03ff3af8b99039645523d30c341fa77a09a8db8a80911c3832af9d6edabe920e5eaf31379ab7e36ec82ff58bfcd6060138211171a6a14e41b8002e426d0587a8318d1fddb4c609c144b910891e7410dced32b3704d50c54dfbf9d9bf433ba01f9d9aaae1313f70fdbca5fed3e069352ff931e29ba495d6ad97e4cd76e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_ACT={0x13d0, 0x2, [@m_mirred={0x174, 0x6, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x2d3, 0x0, 0x400, 0x800}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x1, 0xffffffffffffffff, 0x8}, 0x97c98fa747f7e3ba, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x81, 0x4, 0x7, 0x1}, 0x2, r10}}]}, {0xe6, 0x6, "519f8b97e97f55fe911ab10f5d39386372d0df8dad19af444e648e3c0c4111fe081ced2a75e460807431afdd9ab3c906e81ab2f38291e4cdb81726902d90e1ae815d1c642c06e136c0deaddad897be726f63eb89f5199aac9b635b9876f99426ec8d8426f0d13ac9716b9cb4a76436de8069dc7f0ee0a4f3b08c7b4327d9f3ab4e911e5b3b8f272021235591560dd7033c36a682579df8c1508586ddd8765d125c38411e828894c457742c7e4602922ffcd1760780a884bcec4652ed9fcb851bc11a61e3030db4fc8588e13b915dad5044e7bfecbeef204ad11bdd7fe0b5796b04af"}, {0xc}, {0xc, 0x8, {0x4, 0x3}}}}, @m_ife={0x74, 0x13, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_TYPE={0x6, 0x5, 0x5}, @TCA_IFE_DMAC={0xa, 0x3, @local}]}, {0x23, 0x6, "ea9d79d15e82824b755fe035eed295dd5d8114513aa1047f01628d06d55131"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_xt={0x9c, 0xc, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}]}, {0x69, 0x6, "e40a84cf51f35a17c05a710295ea376ebb57e15e0fb73b6b36c6473f5f39f85a0683f59cedbccd75faeaa6f22214b1ae5d1487595b3d6018d25dafa300fbc456e7feeb31fc34505a332ce517eac74736c72bbcefee38abe20b304fb967e380014303fd0e46"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_xt={0xc0, 0xd, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x46, 0x6, "311de6d71701f896f9b49f6d17b28ae32b5aa81b21d8174072217446016a50cbbbb58e5f9bc66948221001a08c287639055ffef55ce8632e969051e40e717c94740b"}, {0xc}, {0xc, 0x8, {0x7, 0x2}}}}, @m_mpls={0x1088, 0x14, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0xff, 0x5, 0x7, 0x200, 0x1}, 0x3}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xce5e, 0xff, 0x3, 0x4, 0x101}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4ef15}]}, {0x1004, 0x6, "f1cf1a88f3dd5839db4b6cc0cf8d7ef36f407e742495fa118581b3aeb6e4a4c07c3e0e3c001881c5a4f4d42b5c12869581b086e32290ea049e08ca29dd772148bb178758b08deb64600ccec3fbfd1b894b7b136e4a3fab62a714d4fa0be8897365c77d75936f2dc41d02bf1aad197838adc6825fa4fdf8712d80394cfaaeb346bca4c0258534c144521927b3a8515c3fc595ed5fe061a74ada66ab720b66735827436cc051711cb17c629d283b56acb535a5112abc3ec1ca244743e1b5d7ded9472af41e88356031c428e1c74a9c2c22d3ba919edf097cf09c97878792b090acd3244d093616823ce183ead88d496dca1237f25ce0b59b9b87c8c4b466ff0ca916a8aeba4532f23196959415b97520eb11dc9661bfba081528ca8317a3dabdcdadd723fe756798f81fcc592f512d74c57e6744a8b262ffec59d7bfa022c2063d06e71a3d98297cf984158bd171e848a591282de5d134f0cbcc71b986cc17ed449baf52a67f7554989b56f065f9d53a5767a7f99b5c6b872fbcb3fb73b91b302bc290f1dc08bf1ed0886df25ac141b01d96886076b4e4d087ae9a3b38b548de84b5ff9b4d5ed6bd8fad08fd3bc3f075e4d4bbb878ac72bf536877261927a3a5f0b549d4af42f87c6f6f93e4707faa59e295eeaec751c6b2292803ddc0ab5776214071b3d76ec4bd68f8e833c3e9eeb891bd84ee23b737813c10feda83251124fb64b5e68352b6eda3ce2eb52070ba619179dbcbff10f227c91f04c86fe76b474592784ce485cef891e574f1fde2086e82e1bfb233fdbcac2e252ae4a8b1744d88a32a9a9d2fc6906c73ad25eb4f1c34aef1fdd66530de8f15594974ccc577e23974abb121c3296ecc16383288144a0b5d841a24763b7a86d9194f04a6499e95b69575e4f9b3de312b2391df588640b1b2db4874146cf2c3bdd95397cfd2e38a6b351ee11103a04831947c5e3735d0d22affc96de68c093965a3810309244c63daac52314be8da37dc562791d332a0db52b737a878ad3a69aaf0a9e0df1e32f01587551433fc130a044350b6861207963cb72ed19439150e98cfa45a3f2a5c46dfd42a443f94d3e8fd9ead2616dad2c65aa176e0a3c1138111eb110f6bf74f93a9bb6ef954357023ecf100cc120b148e1b0023172bed02bf95296cfc83ae72b442a62ec9e84a80f98eb10f0372f11e3f60bf96877b53ca62173438628ceb5bc54a569fb71b97230f25aaed5e2d41e563f4150b0c71dbcc3f97969950d662d118b934a8189aded472a6a6727e55d4bd64141eda1d965cb2cb8a03e331011a8d7eb89af5860c3ee9ec48d2642408b81a881b946303b246f36b15a34d022a4e23156dd9526fed5be0a2d4bb94e7fddf5ea3cb82a5ed8eb66f09f390519b4bef63cb9ee3a814b138cb0bf217e204a120cf4f879ee7cbc917cd9ab89e7f886ccef08b4c3b537b2f6af6a4bca1cddf1e309f411b9b8ca2f1b254275174c4c74eba7fc37ca47625229b3e83f0a5d0818f165131299769354b1be79a4cefcfc1776a8136ce8cb3fb86f0ab6ab87d5d30e672660472c794518020cbbc098d8c932984151aa416a619d931406e3046ea58d3464cec3e26229fc70dbfec2f2a735d4598882bf56d61f0923fd35d240c889732dfd054f978e7dc16578a0297d18b1a30ca2146073fb9774d5ded1f3e3729cf811e4f3b6fb5705bb7eacdfe45914631ea7f9a54fdc64584c6dcb4bf824dd6d517755a809987fec9ab67e1babb24c03b319b75153940679ea16ce79b2d856faa218ba116a6e757bd81a3fb89e445aeb2d684aa3b85a57ff9cf695ffe2e35fcb6bd3da01a8b15a9390839a35b483ea5d6046b9379ee6dccd88acce9317d780698faee95d27ab44deed25d05e8739985afa0c10766b87eac9c325e25ebdd9ca655d37e00bdedfc5e48349bff44395cd79c5a43b846d99c0cd4e65308c95bb7b3a36efb4b70bc1af649daecb251594256565022daf5a8ad1f77d43831abdd2ff786685926a32c18858ddd94fe688691090c46a59413fb2741d027965019b3a7d4fe0b4f0982069dc634ca18bf0454779ab5badce39a920f6c8cf3dafaf3a933ef7472cfe28f6909d3b65f921b4c561c9eac37e88d13b542a098a77fd987612da2160fefff8933135efdfb5437719e11b671c4ae0959b09c6e64fb6a8f445c4969b76af10dc5cfe8a9313fc3d575a17c382705e1520ef4de849694e9db7817dd25a2b5630e5efc935b5b8efad6ddc1cf1351885eb934b622c8fe279e68f7ff569d27d06f118e05a04a75b4fff9de8a5c241324c40a4cf941778db22a40bbe6063cf6ccfa85d4e1653ffd873b7b5a3e1f7e015deebec714324019e51870a3f62ac4e56ca154038d12e26b92bbd27d9badf16ef0e990f530df130b7d89ffb7e6e3c1ef7eacaa06da9079c2f0f3535aa6403bfd82216aae98acb69f660a86f04b3fcf6dfc07c922c0b5ae349ab2c6291d1c90340dfbfbd8fccbf966f633f04058deb4d18b083c868b9c1eb7f032827159ec47d3e0313507c8ed8aab5be87376a9c7e0388f13ea790e20f8254ec868d5d5a37a543605450b8c146c700df48257c377514f9c5f61eb96f3a830fe76a3969cd718563e2a78489f6332fcc776950362317935dd2974601c0edf49a123284d3cae0874ac7aaa9734849919df14fd28138713e250c4df9661a27a7fc7558689fa8bdd406160747342ae3ecaca716cf8d245b879f0f2c1387b61211377ea00e33c7cda64a773080c8239ae14c9b8a7b01a4202c4edf0a77df18e2847a77dce3913be801c3337f383a3e6646016f9bcae125ae3a9f9cd9126c88ff6918c185ce033a2952090d7fc72d0e02c836dcc5ea45914a2f98e339f27f08158d7faf59c77d161eafa761f1b38aecd6c464d404b35182deb5322eab33ba48e2155c41aedc7ed447d9b1473ad7d887badeb0049bc1209c417ed231995ae1460cbcc022940d973612489372a73162e378b4fb0d7fe05c43fee27453eb4ac5bfe612d50fee8341419a33de4e78224fd8a72dbb430678497a6657365b9407a7fddb5d9ddb4899fa44bae18c3a2d3d475e6390e68a2cd9d66202e93a370bf70079e09ccc4a04e2ec8e69740d7a927775b445f48b2dfe10039daa3aad4b9020dadccaf6314c296310c3e552689f83da0be691cda72e838b4404fb44d16b90bd4e9e2e4eb9b9153fbcd915c4098b795a65809a9dba9fcbc530af78802c1e4da8a84b24bbf3e4049fa514a8393e21e29d007038dd660faac825b935169a72026f5c8288f5d39a09bf176542b6d748d984ce85b2e87604a0b3906bdb27aa2de966d3236b0479dc672da2e99f924e91ef1917a0dc6c100f36998b72732b09274b0feb34dee7b82324957f20c13cf587b457d99e6aabc16c47591fbf5513351cf619145f5afc0a41c063c2711fa9c79aac5cc8fec4dc3cd600c4c17f69a4b77258e69c71d1737840c396a757e776cbe1cb85fd4399ad0425aa4b160411c75694b0943853b8d016cda2d1daf424e4f247f50369146e68e7711eaaab81f21a5eb688f9f4339e9e330f87133401d9015ae8a2c4e8227acae5c088a2641860a4c3359f010077a1c20c6aae0f8cfe45b2f75caf15cc333c71477e6f0633c540e71848a9c1a5f2f4b34532e33bf41dbaf85a09aa3c9dc2c89a656f64ead4b59fe243b06b361dbdeecbaa0bc2a3edb9cdd43519e50664d5fb91d13fc6bcbefd19288588946e213d2e5c1b79c6a3bfaa222a9cfaeac5fcc1f933cbccd686284dd5f36b90cb7ea0cbb3c6ed7048b62d6799066a7fe4ce90df2e0af0a602e0f003efe1db60e59d92d5ab950ec0d3980ad3b7fd275ea3bbca1536dc70e8312fdaa63a6bcaa72c9145e3567ebcf2a8eb9ca037f005dec6f07cdf7164132d35ec4c414b6b40964f9d0144720c34300b18ef66738e447bf3c04867c485186fe96d8536eb133856efb33ec8cf3714eab36520cd8c6e1f55ad14b5467c3ceffa7ab1ad3738e30e878d79e297296dbd70e17fda2917b9869c12b5b837b09bd1c8ce3730ff529c53eac6e8cabc0182537a9f21c3ea89996dcd0ac0c6a84ba96b65c0f3535639e9f282b29d419991ef85e5df6bd15726475a781594de6a0a945bb631fc5ce4b0bc9caf6a474885c7cccdd57bfdeb6b04bd4c352599f453a439cb9e23d922088f332453e6c7e20bd3a7e767c3a5da9fa63e83ca8a0d3e7f31cb94456a6f0a8e0eb124726e9ee098fcfeff957da0409bd32ff38f0f063fb08f27daf44bc89ae1c36d0cfbe7eb4fc7db8ba5e380f86d6beb12f5fce3188bd620bed234f4dc88491b2b00ad52904219db3cd5ebf680c57cadb6f503ecdcf6d875d36cbf25d9794284d302cff9e5686e2682fa92dc55a5d22c2b3af39af69e510010dedc1b9d01dc4376700f8616e946c5e39b68ebf23919f0bd8506afaf1b3586e752dc2d033a348f4cdf0cde0b48787a481419755df1a919314691988ec08e1ad96de4fc1321124e3e900439cb87c31d5fc74ef2360a17dd0ac636ebf80a11102d3c22c050b37b5d586db76b4347e32f4e458e320182efecb44d195a5badedadb4e7be147292f3c82bc71828ab4a6ccb5d356ae91a093ca89bbc0f485b60e9dcc8bbc61ba5ee268f3ec0cefdafc1e3777c9813ba793033f82decf1ca78ba7dd2cc21b8d4710c5d5dc673eb8a85ee376b3f7fb5dd0fa040463289a4592ca578e64c25070bc126ffd8785e219522b04d5722c6159ab279a1329aa1d9c066b4e9d249b0208f2896f13d6cc18a909c3b106d3440e9e50af3755a97e263dfce7ebdcbee5374c66139242d391464b9ee77da7c9bd216414dc0b6a2ae927c118351c4a55a429ecb12852a9c27c8c41b8b15f9ebc84a5f64c64c48dbc4dab2b9f203486eff18958623356cb430e58d2fb6b41ba363a7db54943b3d14bb15688831fb939c9ab406819567ccc9df36ffa6abe53fdd23aac719f5d9c94b2293dcbd071555012713776735fec9e9454b164690e128b69a9e37c3f700f2d3db63f658f1f3661d330abbfcdc81bf671c71c3c9ac749e15ca33f56ebf10a28bd1810de8c9052ff30f74ea14e78dbf017ab4e84349c5a267d5d1a2a75c6d0a2fdbf75d27c4e34f65322711ee35a44d1e4f9689b5003e9075783d3128ec8482042359a4931c625bcf3f7935b67d540e905b35450411e859ea91da4a058bedd6db124cf141b0c6edbdd94b07efba905599a56e9c5189f188579ffd2ee470e4b155c72b53bab9ec160acaa465ec66a28fbf5bd450c9a348c93c0a680497bf4d261a3937953c3afc3b03064fc4de8ec8ca79e3c7e373c0aa65eba0b43964834e70fe1070df8e772a00194b1896da4b182807db26cd9844ca32a4d87605ad715ddbd4af7c271e50a1f155e2cd5e8877625e4b4182df49a0e522b452c14ccd7fcc6e73a435dc1f679a12430d88587801a2d8de42f9b9b92335d08d386a5e042e14365acd79fd43b433926b13abfd488572fc38f09af50ce9b85abc0d55d19b1e699c6b0b3151027f7e115ca72111b23539d248881ee43a8153dd8b4ef5464566cdaa411a0f9e71a98ade960f98e61b3c8bb64f3933d22401fe1e1083fee5ba696bc2f04b8f3f031673c3d207c07c478b62221e2751bbfff5da495a4ba49970dfdbfd17a1cfa42f485104b78f7f3e65c0d36a6f2e9df183a41568d6d51c91129f456b691c5fe976c5954fc03e3f7f4bf9bdda98b6d49c6a947115c8539a7d5d1693e3fcd28de0cf9b8d3921cd6dfc38d2de021cca3c9bddc26c5564fdbe11e2b3a4771960aa0b0135347"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_MATCHALL_ACT={0x1d0, 0x2, [@m_vlan={0x90, 0x3, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x880}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x80000000, 0x7, 0x685, 0x1b89c000}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e0}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5e8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x28, 0x6, "1a988d3816b16d4ee7c584cf6c3c617924ba681c984ca5397ae8cac2fdfa24a81c34211d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x13c, 0x8, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xd9, 0x6, "679d2b9123fc7fb8af12d0f7db65d42e1debcbcf7ccf221302632dd0a57d3e756a7c3984a6c3094dc2314385f0386c27a8b4164eec8ee6297a940a163e90491639bb6189d934f2ae3103e8f475e3d284209709c9ef346071bd9b7065064fad5b5647fac2d4b93455f620d60961930eb74fb118543e7e7b3bd6303906d10fb1e929e560e545c06762c3fdce87e29d6d1d47f2f8657db787d40e6384b4f77e4b14609e6e7c08e53e1a058924730f79765c765e52a9006bbd7e73c2fe4a029a4bf6252c92af3700a85208014c785063a56bffcbe04ff7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x4, 0xfff1}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x3}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x16f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x4002001) (async) [ 3203.996834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3204.016181] loop2: p2 < > p3 p4 [ 3204.019818] loop2: partition table partially beyond EOD, truncated 03:03:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x4, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3204.051736] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3204.061331] loop2: p4 start 16777216 is beyond EOD, truncated [ 3204.068101] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3204.080270] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3204.087453] loop5: p2 p3 p4 [ 3204.092008] loop5: p2 size 1073872899 extends beyond EOD, truncated 03:03:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200250700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3204.104774] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3204.113143] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3204.123792] ldm_validate_privheads(): Disk read failed. [ 3204.131725] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3204.132804] loop3: p2 p3 p4 [ 3204.159798] loop3: partition table partially beyond EOD, truncated [ 3204.176075] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3204.230910] loop3: p3 start 225 is beyond EOD, truncated [ 3204.231166] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3204.253330] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3204.255256] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3204.270441] loop5: p2 p3 p4 [ 3204.306374] loop5: p2 size 1073872899 extends beyond EOD, truncated [ 3204.370871] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3204.427746] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:45 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000400024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000001ee8000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072002b0700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x5, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5ebc9dc2dcb11b6c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd2d, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb70000000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0xa, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, 0x0, 0x4800) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10468}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44030}, 0x1) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000956b051c049445e0c3c0c93112283a534ffc429d8d75db945b40e543ee56eb1514ea42cfcd1bdf658422f945c094637731cdd218857a9f7a3942598bab3afc9339aa00d9faa5cf801ac3d7e2c256"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x8400, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'geneve0\x00', 0x0}) bind$packet(r8, &(0x7f0000000040)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r7, &(0x7f0000001c00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001bc0)={&(0x7f00000004c0)=@newchain={0x16f8, 0x64, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xf, 0xf}, {0x8, 0xfff1}, {0x9, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x16bc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}, @TCA_MATCHALL_ACT={0xf0, 0x2, [@m_vlan={0xec, 0x9, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}]}, {0xad, 0x6, "ac0266a045d7b806131ff34a9266aa4c191f9cfea27f829f0a5ebdd5f4c0675951c2c2e6eafe47e19e5bd9c2b03ff3af8b99039645523d30c341fa77a09a8db8a80911c3832af9d6edabe920e5eaf31379ab7e36ec82ff58bfcd6060138211171a6a14e41b8002e426d0587a8318d1fddb4c609c144b910891e7410dced32b3704d50c54dfbf9d9bf433ba01f9d9aaae1313f70fdbca5fed3e069352ff931e29ba495d6ad97e4cd76e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_ACT={0x13d0, 0x2, [@m_mirred={0x174, 0x6, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x2d3, 0x0, 0x400, 0x800}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x1, 0xffffffffffffffff, 0x8}, 0x97c98fa747f7e3ba, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x81, 0x4, 0x7, 0x1}, 0x2, r10}}]}, {0xe6, 0x6, "519f8b97e97f55fe911ab10f5d39386372d0df8dad19af444e648e3c0c4111fe081ced2a75e460807431afdd9ab3c906e81ab2f38291e4cdb81726902d90e1ae815d1c642c06e136c0deaddad897be726f63eb89f5199aac9b635b9876f99426ec8d8426f0d13ac9716b9cb4a76436de8069dc7f0ee0a4f3b08c7b4327d9f3ab4e911e5b3b8f272021235591560dd7033c36a682579df8c1508586ddd8765d125c38411e828894c457742c7e4602922ffcd1760780a884bcec4652ed9fcb851bc11a61e3030db4fc8588e13b915dad5044e7bfecbeef204ad11bdd7fe0b5796b04af"}, {0xc}, {0xc, 0x8, {0x4, 0x3}}}}, @m_ife={0x74, 0x13, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_TYPE={0x6, 0x5, 0x5}, @TCA_IFE_DMAC={0xa, 0x3, @local}]}, {0x23, 0x6, "ea9d79d15e82824b755fe035eed295dd5d8114513aa1047f01628d06d55131"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_xt={0x9c, 0xc, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}]}, {0x69, 0x6, "e40a84cf51f35a17c05a710295ea376ebb57e15e0fb73b6b36c6473f5f39f85a0683f59cedbccd75faeaa6f22214b1ae5d1487595b3d6018d25dafa300fbc456e7feeb31fc34505a332ce517eac74736c72bbcefee38abe20b304fb967e380014303fd0e46"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_xt={0xc0, 0xd, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x46, 0x6, "311de6d71701f896f9b49f6d17b28ae32b5aa81b21d8174072217446016a50cbbbb58e5f9bc66948221001a08c287639055ffef55ce8632e969051e40e717c94740b"}, {0xc}, {0xc, 0x8, {0x7, 0x2}}}}, @m_mpls={0x1088, 0x14, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0xff, 0x5, 0x7, 0x200, 0x1}, 0x3}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xce5e, 0xff, 0x3, 0x4, 0x101}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4ef15}]}, {0x1004, 0x6, "f1cf1a88f3dd5839db4b6cc0cf8d7ef36f407e742495fa118581b3aeb6e4a4c07c3e0e3c001881c5a4f4d42b5c12869581b086e32290ea049e08ca29dd772148bb178758b08deb64600ccec3fbfd1b894b7b136e4a3fab62a714d4fa0be8897365c77d75936f2dc41d02bf1aad197838adc6825fa4fdf8712d80394cfaaeb346bca4c0258534c144521927b3a8515c3fc595ed5fe061a74ada66ab720b66735827436cc051711cb17c629d283b56acb535a5112abc3ec1ca244743e1b5d7ded9472af41e88356031c428e1c74a9c2c22d3ba919edf097cf09c97878792b090acd3244d093616823ce183ead88d496dca1237f25ce0b59b9b87c8c4b466ff0ca916a8aeba4532f23196959415b97520eb11dc9661bfba081528ca8317a3dabdcdadd723fe756798f81fcc592f512d74c57e6744a8b262ffec59d7bfa022c2063d06e71a3d98297cf984158bd171e848a591282de5d134f0cbcc71b986cc17ed449baf52a67f7554989b56f065f9d53a5767a7f99b5c6b872fbcb3fb73b91b302bc290f1dc08bf1ed0886df25ac141b01d96886076b4e4d087ae9a3b38b548de84b5ff9b4d5ed6bd8fad08fd3bc3f075e4d4bbb878ac72bf536877261927a3a5f0b549d4af42f87c6f6f93e4707faa59e295eeaec751c6b2292803ddc0ab5776214071b3d76ec4bd68f8e833c3e9eeb891bd84ee23b737813c10feda83251124fb64b5e68352b6eda3ce2eb52070ba619179dbcbff10f227c91f04c86fe76b474592784ce485cef891e574f1fde2086e82e1bfb233fdbcac2e252ae4a8b1744d88a32a9a9d2fc6906c73ad25eb4f1c34aef1fdd66530de8f15594974ccc577e23974abb121c3296ecc16383288144a0b5d841a24763b7a86d9194f04a6499e95b69575e4f9b3de312b2391df588640b1b2db4874146cf2c3bdd95397cfd2e38a6b351ee11103a04831947c5e3735d0d22affc96de68c093965a3810309244c63daac52314be8da37dc562791d332a0db52b737a878ad3a69aaf0a9e0df1e32f01587551433fc130a044350b6861207963cb72ed19439150e98cfa45a3f2a5c46dfd42a443f94d3e8fd9ead2616dad2c65aa176e0a3c1138111eb110f6bf74f93a9bb6ef954357023ecf100cc120b148e1b0023172bed02bf95296cfc83ae72b442a62ec9e84a80f98eb10f0372f11e3f60bf96877b53ca62173438628ceb5bc54a569fb71b97230f25aaed5e2d41e563f4150b0c71dbcc3f97969950d662d118b934a8189aded472a6a6727e55d4bd64141eda1d965cb2cb8a03e331011a8d7eb89af5860c3ee9ec48d2642408b81a881b946303b246f36b15a34d022a4e23156dd9526fed5be0a2d4bb94e7fddf5ea3cb82a5ed8eb66f09f390519b4bef63cb9ee3a814b138cb0bf217e204a120cf4f879ee7cbc917cd9ab89e7f886ccef08b4c3b537b2f6af6a4bca1cddf1e309f411b9b8ca2f1b254275174c4c74eba7fc37ca47625229b3e83f0a5d0818f165131299769354b1be79a4cefcfc1776a8136ce8cb3fb86f0ab6ab87d5d30e672660472c794518020cbbc098d8c932984151aa416a619d931406e3046ea58d3464cec3e26229fc70dbfec2f2a735d4598882bf56d61f0923fd35d240c889732dfd054f978e7dc16578a0297d18b1a30ca2146073fb9774d5ded1f3e3729cf811e4f3b6fb5705bb7eacdfe45914631ea7f9a54fdc64584c6dcb4bf824dd6d517755a809987fec9ab67e1babb24c03b319b75153940679ea16ce79b2d856faa218ba116a6e757bd81a3fb89e445aeb2d684aa3b85a57ff9cf695ffe2e35fcb6bd3da01a8b15a9390839a35b483ea5d6046b9379ee6dccd88acce9317d780698faee95d27ab44deed25d05e8739985afa0c10766b87eac9c325e25ebdd9ca655d37e00bdedfc5e48349bff44395cd79c5a43b846d99c0cd4e65308c95bb7b3a36efb4b70bc1af649daecb251594256565022daf5a8ad1f77d43831abdd2ff786685926a32c18858ddd94fe688691090c46a59413fb2741d027965019b3a7d4fe0b4f0982069dc634ca18bf0454779ab5badce39a920f6c8cf3dafaf3a933ef7472cfe28f6909d3b65f921b4c561c9eac37e88d13b542a098a77fd987612da2160fefff8933135efdfb5437719e11b671c4ae0959b09c6e64fb6a8f445c4969b76af10dc5cfe8a9313fc3d575a17c382705e1520ef4de849694e9db7817dd25a2b5630e5efc935b5b8efad6ddc1cf1351885eb934b622c8fe279e68f7ff569d27d06f118e05a04a75b4fff9de8a5c241324c40a4cf941778db22a40bbe6063cf6ccfa85d4e1653ffd873b7b5a3e1f7e015deebec714324019e51870a3f62ac4e56ca154038d12e26b92bbd27d9badf16ef0e990f530df130b7d89ffb7e6e3c1ef7eacaa06da9079c2f0f3535aa6403bfd82216aae98acb69f660a86f04b3fcf6dfc07c922c0b5ae349ab2c6291d1c90340dfbfbd8fccbf966f633f04058deb4d18b083c868b9c1eb7f032827159ec47d3e0313507c8ed8aab5be87376a9c7e0388f13ea790e20f8254ec868d5d5a37a543605450b8c146c700df48257c377514f9c5f61eb96f3a830fe76a3969cd718563e2a78489f6332fcc776950362317935dd2974601c0edf49a123284d3cae0874ac7aaa9734849919df14fd28138713e250c4df9661a27a7fc7558689fa8bdd406160747342ae3ecaca716cf8d245b879f0f2c1387b61211377ea00e33c7cda64a773080c8239ae14c9b8a7b01a4202c4edf0a77df18e2847a77dce3913be801c3337f383a3e6646016f9bcae125ae3a9f9cd9126c88ff6918c185ce033a2952090d7fc72d0e02c836dcc5ea45914a2f98e339f27f08158d7faf59c77d161eafa761f1b38aecd6c464d404b35182deb5322eab33ba48e2155c41aedc7ed447d9b1473ad7d887badeb0049bc1209c417ed231995ae1460cbcc022940d973612489372a73162e378b4fb0d7fe05c43fee27453eb4ac5bfe612d50fee8341419a33de4e78224fd8a72dbb430678497a6657365b9407a7fddb5d9ddb4899fa44bae18c3a2d3d475e6390e68a2cd9d66202e93a370bf70079e09ccc4a04e2ec8e69740d7a927775b445f48b2dfe10039daa3aad4b9020dadccaf6314c296310c3e552689f83da0be691cda72e838b4404fb44d16b90bd4e9e2e4eb9b9153fbcd915c4098b795a65809a9dba9fcbc530af78802c1e4da8a84b24bbf3e4049fa514a8393e21e29d007038dd660faac825b935169a72026f5c8288f5d39a09bf176542b6d748d984ce85b2e87604a0b3906bdb27aa2de966d3236b0479dc672da2e99f924e91ef1917a0dc6c100f36998b72732b09274b0feb34dee7b82324957f20c13cf587b457d99e6aabc16c47591fbf5513351cf619145f5afc0a41c063c2711fa9c79aac5cc8fec4dc3cd600c4c17f69a4b77258e69c71d1737840c396a757e776cbe1cb85fd4399ad0425aa4b160411c75694b0943853b8d016cda2d1daf424e4f247f50369146e68e7711eaaab81f21a5eb688f9f4339e9e330f87133401d9015ae8a2c4e8227acae5c088a2641860a4c3359f010077a1c20c6aae0f8cfe45b2f75caf15cc333c71477e6f0633c540e71848a9c1a5f2f4b34532e33bf41dbaf85a09aa3c9dc2c89a656f64ead4b59fe243b06b361dbdeecbaa0bc2a3edb9cdd43519e50664d5fb91d13fc6bcbefd19288588946e213d2e5c1b79c6a3bfaa222a9cfaeac5fcc1f933cbccd686284dd5f36b90cb7ea0cbb3c6ed7048b62d6799066a7fe4ce90df2e0af0a602e0f003efe1db60e59d92d5ab950ec0d3980ad3b7fd275ea3bbca1536dc70e8312fdaa63a6bcaa72c9145e3567ebcf2a8eb9ca037f005dec6f07cdf7164132d35ec4c414b6b40964f9d0144720c34300b18ef66738e447bf3c04867c485186fe96d8536eb133856efb33ec8cf3714eab36520cd8c6e1f55ad14b5467c3ceffa7ab1ad3738e30e878d79e297296dbd70e17fda2917b9869c12b5b837b09bd1c8ce3730ff529c53eac6e8cabc0182537a9f21c3ea89996dcd0ac0c6a84ba96b65c0f3535639e9f282b29d419991ef85e5df6bd15726475a781594de6a0a945bb631fc5ce4b0bc9caf6a474885c7cccdd57bfdeb6b04bd4c352599f453a439cb9e23d922088f332453e6c7e20bd3a7e767c3a5da9fa63e83ca8a0d3e7f31cb94456a6f0a8e0eb124726e9ee098fcfeff957da0409bd32ff38f0f063fb08f27daf44bc89ae1c36d0cfbe7eb4fc7db8ba5e380f86d6beb12f5fce3188bd620bed234f4dc88491b2b00ad52904219db3cd5ebf680c57cadb6f503ecdcf6d875d36cbf25d9794284d302cff9e5686e2682fa92dc55a5d22c2b3af39af69e510010dedc1b9d01dc4376700f8616e946c5e39b68ebf23919f0bd8506afaf1b3586e752dc2d033a348f4cdf0cde0b48787a481419755df1a919314691988ec08e1ad96de4fc1321124e3e900439cb87c31d5fc74ef2360a17dd0ac636ebf80a11102d3c22c050b37b5d586db76b4347e32f4e458e320182efecb44d195a5badedadb4e7be147292f3c82bc71828ab4a6ccb5d356ae91a093ca89bbc0f485b60e9dcc8bbc61ba5ee268f3ec0cefdafc1e3777c9813ba793033f82decf1ca78ba7dd2cc21b8d4710c5d5dc673eb8a85ee376b3f7fb5dd0fa040463289a4592ca578e64c25070bc126ffd8785e219522b04d5722c6159ab279a1329aa1d9c066b4e9d249b0208f2896f13d6cc18a909c3b106d3440e9e50af3755a97e263dfce7ebdcbee5374c66139242d391464b9ee77da7c9bd216414dc0b6a2ae927c118351c4a55a429ecb12852a9c27c8c41b8b15f9ebc84a5f64c64c48dbc4dab2b9f203486eff18958623356cb430e58d2fb6b41ba363a7db54943b3d14bb15688831fb939c9ab406819567ccc9df36ffa6abe53fdd23aac719f5d9c94b2293dcbd071555012713776735fec9e9454b164690e128b69a9e37c3f700f2d3db63f658f1f3661d330abbfcdc81bf671c71c3c9ac749e15ca33f56ebf10a28bd1810de8c9052ff30f74ea14e78dbf017ab4e84349c5a267d5d1a2a75c6d0a2fdbf75d27c4e34f65322711ee35a44d1e4f9689b5003e9075783d3128ec8482042359a4931c625bcf3f7935b67d540e905b35450411e859ea91da4a058bedd6db124cf141b0c6edbdd94b07efba905599a56e9c5189f188579ffd2ee470e4b155c72b53bab9ec160acaa465ec66a28fbf5bd450c9a348c93c0a680497bf4d261a3937953c3afc3b03064fc4de8ec8ca79e3c7e373c0aa65eba0b43964834e70fe1070df8e772a00194b1896da4b182807db26cd9844ca32a4d87605ad715ddbd4af7c271e50a1f155e2cd5e8877625e4b4182df49a0e522b452c14ccd7fcc6e73a435dc1f679a12430d88587801a2d8de42f9b9b92335d08d386a5e042e14365acd79fd43b433926b13abfd488572fc38f09af50ce9b85abc0d55d19b1e699c6b0b3151027f7e115ca72111b23539d248881ee43a8153dd8b4ef5464566cdaa411a0f9e71a98ade960f98e61b3c8bb64f3933d22401fe1e1083fee5ba696bc2f04b8f3f031673c3d207c07c478b62221e2751bbfff5da495a4ba49970dfdbfd17a1cfa42f485104b78f7f3e65c0d36a6f2e9df183a41568d6d51c91129f456b691c5fe976c5954fc03e3f7f4bf9bdda98b6d49c6a947115c8539a7d5d1693e3fcd28de0cf9b8d3921cd6dfc38d2de021cca3c9bddc26c5564fdbe11e2b3a4771960aa0b0135347"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_MATCHALL_ACT={0x1d0, 0x2, [@m_vlan={0x90, 0x3, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x880}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x80000000, 0x7, 0x685, 0x1b89c000}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e0}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5e8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x28, 0x6, "1a988d3816b16d4ee7c584cf6c3c617924ba681c984ca5397ae8cac2fdfa24a81c34211d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x13c, 0x8, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xd9, 0x6, "679d2b9123fc7fb8af12d0f7db65d42e1debcbcf7ccf221302632dd0a57d3e756a7c3984a6c3094dc2314385f0386c27a8b4164eec8ee6297a940a163e90491639bb6189d934f2ae3103e8f475e3d284209709c9ef346071bd9b7065064fad5b5647fac2d4b93455f620d60961930eb74fb118543e7e7b3bd6303906d10fb1e929e560e545c06762c3fdce87e29d6d1d47f2f8657db787d40e6384b4f77e4b14609e6e7c08e53e1a058924730f79765c765e52a9006bbd7e73c2fe4a029a4bf6252c92af3700a85208014c785063a56bffcbe04ff7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x4, 0xfff1}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x3}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x16f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x4002001) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5ebc9dc2dcb11b6c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd2d, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc4) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb70000000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0xa, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r0, 0x0, 0x4800) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10468}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44030}, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000956b051c049445e0c3c0c93112283a534ffc429d8d75db945b40e543ee56eb1514ea42cfcd1bdf658422f945c094637731cdd218857a9f7a3942598bab3afc9339aa00d9faa5cf801ac3d7e2c256"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x8400, 0x0) (async) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'geneve0\x00'}) (async) bind$packet(r8, &(0x7f0000000040)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @dev}, 0x14) (async) sendmsg$nl_route_sched(r7, &(0x7f0000001c00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001bc0)={&(0x7f00000004c0)=@newchain={0x16f8, 0x64, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xf, 0xf}, {0x8, 0xfff1}, {0x9, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x16bc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}, @TCA_MATCHALL_ACT={0xf0, 0x2, [@m_vlan={0xec, 0x9, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}]}, {0xad, 0x6, "ac0266a045d7b806131ff34a9266aa4c191f9cfea27f829f0a5ebdd5f4c0675951c2c2e6eafe47e19e5bd9c2b03ff3af8b99039645523d30c341fa77a09a8db8a80911c3832af9d6edabe920e5eaf31379ab7e36ec82ff58bfcd6060138211171a6a14e41b8002e426d0587a8318d1fddb4c609c144b910891e7410dced32b3704d50c54dfbf9d9bf433ba01f9d9aaae1313f70fdbca5fed3e069352ff931e29ba495d6ad97e4cd76e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_ACT={0x13d0, 0x2, [@m_mirred={0x174, 0x6, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x2d3, 0x0, 0x400, 0x800}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x1, 0xffffffffffffffff, 0x8}, 0x97c98fa747f7e3ba, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x81, 0x4, 0x7, 0x1}, 0x2, r10}}]}, {0xe6, 0x6, "519f8b97e97f55fe911ab10f5d39386372d0df8dad19af444e648e3c0c4111fe081ced2a75e460807431afdd9ab3c906e81ab2f38291e4cdb81726902d90e1ae815d1c642c06e136c0deaddad897be726f63eb89f5199aac9b635b9876f99426ec8d8426f0d13ac9716b9cb4a76436de8069dc7f0ee0a4f3b08c7b4327d9f3ab4e911e5b3b8f272021235591560dd7033c36a682579df8c1508586ddd8765d125c38411e828894c457742c7e4602922ffcd1760780a884bcec4652ed9fcb851bc11a61e3030db4fc8588e13b915dad5044e7bfecbeef204ad11bdd7fe0b5796b04af"}, {0xc}, {0xc, 0x8, {0x4, 0x3}}}}, @m_ife={0x74, 0x13, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x8}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_TYPE={0x6, 0x5, 0x5}, @TCA_IFE_DMAC={0xa, 0x3, @local}]}, {0x23, 0x6, "ea9d79d15e82824b755fe035eed295dd5d8114513aa1047f01628d06d55131"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_xt={0x9c, 0xc, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}]}, {0x69, 0x6, "e40a84cf51f35a17c05a710295ea376ebb57e15e0fb73b6b36c6473f5f39f85a0683f59cedbccd75faeaa6f22214b1ae5d1487595b3d6018d25dafa300fbc456e7feeb31fc34505a332ce517eac74736c72bbcefee38abe20b304fb967e380014303fd0e46"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_xt={0xc0, 0xd, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x46, 0x6, "311de6d71701f896f9b49f6d17b28ae32b5aa81b21d8174072217446016a50cbbbb58e5f9bc66948221001a08c287639055ffef55ce8632e969051e40e717c94740b"}, {0xc}, {0xc, 0x8, {0x7, 0x2}}}}, @m_mpls={0x1088, 0x14, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0xff, 0x5, 0x7, 0x200, 0x1}, 0x3}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xce5e, 0xff, 0x3, 0x4, 0x101}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4ef15}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_MATCHALL_ACT={0x1d0, 0x2, [@m_vlan={0x90, 0x3, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x880}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x80000000, 0x7, 0x685, 0x1b89c000}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e0}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5e8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x28, 0x6, "1a988d3816b16d4ee7c584cf6c3c617924ba681c984ca5397ae8cac2fdfa24a81c34211d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x13c, 0x8, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xd9, 0x6, "679d2b9123fc7fb8af12d0f7db65d42e1debcbcf7ccf221302632dd0a57d3e756a7c3984a6c3094dc2314385f0386c27a8b4164eec8ee6297a940a163e90491639bb6189d934f2ae3103e8f475e3d284209709c9ef346071bd9b7065064fad5b5647fac2d4b93455f620d60961930eb74fb118543e7e7b3bd6303906d10fb1e929e560e545c06762c3fdce87e29d6d1d47f2f8657db787d40e6384b4f77e4b14609e6e7c08e53e1a058924730f79765c765e52a9006bbd7e73c2fe4a029a4bf6252c92af3700a85208014c785063a56bffcbe04ff7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x4, 0xfff1}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x3}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x16f8}, 0x1, 0x0, 0x0, 0x20040000}, 0x4002001) (async) 03:03:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a020000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x6, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072002d0700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) sendmsg$nl_route_sched(r6, 0x0, 0x8451) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) getpeername$l2tp(r7, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f0000000340)=0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000040)=0x10) sendmsg$nl_route(r9, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@ipv6_getnexthop={0x1c, 0x6a, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NHA_GROUPS={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) [ 3204.715461] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3204.777600] loop2: p2 < > p3 p4 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200380700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3204.800866] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3204.809095] loop2: partition table partially beyond EOD, truncated [ 3204.848868] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3204.876958] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3204.891410] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3204.920305] ldm_validate_privheads(): Disk read failed. [ 3204.923214] loop2: p4 start 16777216 is beyond EOD, truncated [ 3204.926598] loop3: p2 p3 p4 [ 3204.943536] loop5: p2 p3 p4 [ 3204.968300] loop5: p2 size 1073872900 extends beyond EOD, truncated [ 3204.981319] loop3: partition table partially beyond EOD, truncated 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200460700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x7, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3205.030528] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3205.044697] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3205.139501] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3205.197610] 8021q: adding VLAN 0 to HW filter on device batadv4151 [ 3205.220083] bond5062: Enslaving batadv4151 as a backup interface with an up link [ 3205.224115] loop3: p3 start 225 is beyond EOD, truncated [ 3205.252035] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3205.267098] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3205.292037] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:45 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000500024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000002ee8000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) sendmsg$nl_route_sched(r6, 0x0, 0x8451) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) (async) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) (async) getpeername$l2tp(r7, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f0000000340)=0x10) (async, rerun: 32) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (rerun: 32) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000040)=0x10) (async) sendmsg$nl_route(r9, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@ipv6_getnexthop={0x1c, 0x6a, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NHA_GROUPS={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200470700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3205.309763] loop5: p2 p3 p4 [ 3205.313327] loop5: p2 size 1073872900 extends beyond EOD, truncated [ 3205.321766] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3205.338057] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x8, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3205.422558] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:03:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a030000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300400a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x9, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3205.526331] loop2: p2 < > p3 p4 [ 3205.534474] loop2: partition table partially beyond EOD, truncated [ 3205.586245] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3205.595781] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3205.597658] loop2: p4 start 33554432 is beyond EOD, truncated [ 3205.643355] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3205.656134] loop5: p2 p3 p4 03:03:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xa, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00600ddeee8000da55aa", 0x40, 0x1c0}]) [ 3205.695784] loop5: p2 size 1073872901 extends beyond EOD, truncated 03:03:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300600a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3205.740602] 8021q: adding VLAN 0 to HW filter on device batadv4152 [ 3205.765671] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3205.789937] bond5063: Enslaving batadv4152 as a backup interface with an up link 03:03:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) (rerun: 64) sendmsg$nl_route_sched(r6, 0x0, 0x8451) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) (async) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x10) getpeername$l2tp(r7, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f0000000340)=0x10) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000040)=0x10) sendmsg$nl_route(r9, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@ipv6_getnexthop={0x1c, 0x6a, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NHA_GROUPS={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r8}, 0x10) [ 3205.897636] ieee802154 phy0 wpan0: encryption failed: -22 [ 3205.901024] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3205.903293] ieee802154 phy1 wpan1: encryption failed: -22 [ 3205.939411] ldm_validate_privheads(): Disk read failed. [ 3205.947518] loop3: p2 p3 p4 [ 3205.959023] loop3: partition table partially beyond EOD, truncated [ 3205.965517] loop2: p2 < > p3 p4 [ 3205.965529] loop2: partition table partially beyond EOD, truncated [ 3205.978830] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3205.993980] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3206.009381] loop2: p4 start 3725418496 is beyond EOD, truncated [ 3206.025420] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3206.041782] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3206.055966] loop5: p2 p3 p4 [ 3206.067406] loop5: p2 size 1073872901 extends beyond EOD, truncated [ 3206.106955] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3206.113865] loop3: p3 start 225 is beyond EOD, truncated [ 3206.135764] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3206.142905] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:46 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000700024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xb, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300800a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xbc6e958fd746e9bd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000070400000000003fe4dcdc4aef37b202860145fe", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r5, @ANYBLOB="c53d12aa38afa76762367b5fd9b905c4580f96b457d48cc2d5075ad80fea1c2940e12e776f"], 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="150000000000000000000002000000257629b25bc9006d010000c50000e7077efd0137"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='xen_mmu_flush_tlb_others\x00', r6}, 0x10) 03:03:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000f08000da55aa", 0x40, 0x1c0}]) [ 3206.221609] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3206.345598] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 03:03:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a040000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300a00a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xc, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xbc6e958fd746e9bd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000070400000000003fe4dcdc4aef37b202860145fe", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r5, @ANYBLOB="c53d12aa38afa76762367b5fd9b905c4580f96b457d48cc2d5075ad80fea1c2940e12e776f"], 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="150000000000000000000002000000257629b25bc9006d010000c50000e7077efd0137"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='xen_mmu_flush_tlb_others\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xbc6e958fd746e9bd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000070400000000003fe4dcdc4aef37b202860145fe", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r5, @ANYBLOB="c53d12aa38afa76762367b5fd9b905c4580f96b457d48cc2d5075ad80fea1c2940e12e776f"], 0x3c}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="150000000000000000000002000000257629b25bc9006d010000c50000e7077efd0137"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='xen_mmu_flush_tlb_others\x00', r6}, 0x10) (async) [ 3206.436773] loop2: p2 < > p3 p4 [ 3206.442462] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3206.462952] loop2: p4 size 3657466096 extends beyond EOD, truncated 03:03:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200301400a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3206.497655] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3206.519277] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3206.527020] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:03:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xd, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3206.552656] loop5: p2 p3 p4 [ 3206.556273] loop5: p2 size 1073872903 extends beyond EOD, truncated 03:03:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003f08000da55aa", 0x40, 0x1c0}]) [ 3206.598370] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3206.620174] ldm_validate_privheads(): Disk read failed. [ 3206.628896] loop3: p2 p3 p4 [ 3206.656034] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3206.662721] loop3: partition table partially beyond EOD, truncated [ 3206.673502] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3206.719461] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3206.762274] loop3: p3 start 225 is beyond EOD, truncated [ 3206.771237] loop2: p2 < > p3 p4 [ 3206.775182] loop2: partition table partially beyond EOD, truncated [ 3206.776010] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3206.782807] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3206.787349] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3206.792874] loop2: p4 start 50331648 is beyond EOD, truncated [ 3206.813734] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3206.827395] loop5: p2 p3 p4 [ 3206.854721] loop5: p2 size 1073872903 extends beyond EOD, truncated [ 3206.897265] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3206.930875] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3207.127268] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3207.136778] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3207.143023] loop5: p2 p3 p4 [ 3207.147362] loop5: p2 size 1073872903 extends beyond EOD, truncated [ 3207.155510] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3207.163176] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:47 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000003024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200303c00a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xe, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xbc6e958fd746e9bd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000070400000000003fe4dcdc4aef37b202860145fe", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r5, @ANYBLOB="c53d12aa38afa76762367b5fd9b905c4580f96b457d48cc2d5075ad80fea1c2940e12e776f"], 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="150000000000000000000002000000257629b25bc9006d010000c50000e7077efd0137"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='xen_mmu_flush_tlb_others\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xbc6e958fd746e9bd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000070400000000003fe4dcdc4aef37b202860145fe", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r5, @ANYBLOB="c53d12aa38afa76762367b5fd9b905c4580f96b457d48cc2d5075ad80fea1c2940e12e776f"], 0x3c}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="150000000000000000000002000000257629b25bc9006d010000c50000e7077efd0137"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='xen_mmu_flush_tlb_others\x00', r6}, 0x10) (async) 03:03:47 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003f28000da55aa", 0x40, 0x1c0}]) 03:03:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a050000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0xf, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200304600a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3207.303684] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3207.335528] loop2: p2 < > p3 p4 [ 3207.338924] loop2: partition table partially beyond EOD, truncated [ 3207.349569] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200304700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3207.381208] loop2: p4 start 50331648 is beyond EOD, truncated [ 3207.391504] ldm_validate_privheads(): Disk read failed. [ 3207.407484] loop3: p2 p3 p4 [ 3207.420085] loop3: partition table partially beyond EOD, truncated 03:03:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x11, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3207.442742] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3207.461424] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3207.482333] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:47 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000002f48000da55aa", 0x40, 0x1c0}]) [ 3207.511205] loop3: p3 start 225 is beyond EOD, truncated [ 3207.523697] loop5: p2 p3 p4 [ 3207.529605] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3207.534668] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:03:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x12, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3207.576302] loop5: p2 size 1073873664 extends beyond EOD, truncated [ 3207.671293] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3207.704846] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3207.715648] loop2: p2 < > p3 p4 [ 3207.719126] loop2: partition table partially beyond EOD, truncated [ 3207.737035] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3207.751491] loop2: p4 start 33554432 is beyond EOD, truncated [ 3207.763353] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:48 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000005024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030fc01a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES16=r0, @ANYBLOB="0cde53aee51b010000ce2efe00d075000a00000000"], 0x3c}}, 0x4008804) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000002400062617461647900000400068008000a00"/32, @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) 03:03:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x14, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a060000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003f48000da55aa", 0x40, 0x1c0}]) [ 3207.796589] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3207.802858] loop5: p2 p3 p4 [ 3207.808600] loop5: p2 size 1073873664 extends beyond EOD, truncated [ 3207.817966] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3207.826821] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030d503a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x15, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3207.913881] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3207.940737] ldm_validate_privheads(): Disk read failed. [ 3207.948780] loop3: p2 p3 p4 03:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) r1 = socket(0x10, 0x803, 0x0) (rerun: 64) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async, rerun: 32) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES16=r0, @ANYBLOB="0cde53aee51b010000ce2efe00d075000a00000000"], 0x3c}}, 0x4008804) (rerun: 32) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000002400062617461647900000400068008000a00"/32, @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) [ 3207.970101] loop3: partition table partially beyond EOD, truncated [ 3207.995095] loop2: p2 < > p3 p4 [ 3207.998577] loop2: partition table partially beyond EOD, truncated 03:03:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200307c07a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3208.024479] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3208.039883] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x17, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3208.073156] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3208.079922] loop3: p3 start 225 is beyond EOD, truncated [ 3208.096782] loop2: p4 start 50331648 is beyond EOD, truncated [ 3208.105064] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3208.123978] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3208.144739] loop5: p2 p3 p4 [ 3208.167834] loop5: p2 size 1073874176 extends beyond EOD, truncated 03:03:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200308407a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3208.252873] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3208.342839] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3208.407381] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3208.449820] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:48 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000007024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00fffffff58000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x1a, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES16=r0, @ANYBLOB="0cde53aee51b010000ce2efe00d075000a00000000"], 0x3c}}, 0x4008804) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000002400062617461647900000400068008000a00"/32, @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) 03:03:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200309207a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a070000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3208.537564] loop5: p2 p3 p4 [ 3208.540887] loop5: p2 size 1073874176 extends beyond EOD, truncated [ 3208.553596] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3208.562140] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030ae07a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x1d, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000953daf5dadda58994a6a84ad46a210e2952109c0c42f490936d9fd3ea7da9675ef21340e2c4bf2cd59c73de653e22065cd624df723389de4b4ba887019b596350be0965e1e4a2f05e669dd3c610ed9cbe906bea0107176bbc9681dcf4c2db79f4e456e0610b806263aa86bbbc5cdfb1442f72ac5b468a3563b063b7e16b3ecee10b97a286ef6eadafc6493aa508905a78badc9f0a0b19cc60e6ade328db58dc5dbdb4a2e60f29ff30f2706893a23d6dfde450be65eced990fb0a87773068c7ea38cb44315179d5d81c1e32fff3e5caaa9db7a2553aa2780b37"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030b507a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3208.719457] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3208.737557] loop2: p2 < > p3 p4 [ 3208.741148] loop2: partition table partially beyond EOD, truncated 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030bd07a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300702a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3208.772576] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3208.799417] loop2: p4 start 4294967040 is beyond EOD, truncated [ 3208.799906] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3208.847992] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3208.857806] loop5: p2 p3 p4 [ 3208.882687] ldm_validate_privheads(): Disk read failed. [ 3208.896452] loop3: p2 p3 p4 [ 3208.910419] loop3: partition table partially beyond EOD, truncated [ 3208.918380] loop5: p2 size 1073874688 extends beyond EOD, truncated [ 3208.943408] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3208.988200] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3208.992982] loop3: p3 start 225 is beyond EOD, truncated [ 3209.004235] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3209.018900] 8021q: adding VLAN 0 to HW filter on device batadv4153 [ 3209.051470] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3209.051736] bond5067: Enslaving batadv4153 as a backup interface with an up link [ 3209.135610] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3209.173297] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3209.180010] loop5: p2 p3 p4 03:03:49 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000000000fdef024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003f68000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x25, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300703a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000953daf5dadda58994a6a84ad46a210e2952109c0c42f490936d9fd3ea7da9675ef21340e2c4bf2cd59c73de653e22065cd624df723389de4b4ba887019b596350be0965e1e4a2f05e669dd3c610ed9cbe906bea0107176bbc9681dcf4c2db79f4e456e0610b806263aa86bbbc5cdfb1442f72ac5b468a3563b063b7e16b3ecee10b97a286ef6eadafc6493aa508905a78badc9f0a0b19cc60e6ade328db58dc5dbdb4a2e60f29ff30f2706893a23d6dfde450be65eced990fb0a87773068c7ea38cb44315179d5d81c1e32fff3e5caaa9db7a2553aa2780b37"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000953daf5dadda58994a6a84ad46a210e2952109c0c42f490936d9fd3ea7da9675ef21340e2c4bf2cd59c73de653e22065cd624df723389de4b4ba887019b596350be0965e1e4a2f05e669dd3c610ed9cbe906bea0107176bbc9681dcf4c2db79f4e456e0610b806263aa86bbbc5cdfb1442f72ac5b468a3563b063b7e16b3ecee10b97a286ef6eadafc6493aa508905a78badc9f0a0b19cc60e6ade328db58dc5dbdb4a2e60f29ff30f2706893a23d6dfde450be65eced990fb0a87773068c7ea38cb44315179d5d81c1e32fff3e5caaa9db7a2553aa2780b37"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) (async) 03:03:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a080000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3209.183535] loop5: p2 size 1073874688 extends beyond EOD, truncated [ 3209.192420] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3209.201744] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300704a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x2f, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300705a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3209.303012] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3209.320020] ldm_validate_privheads(): Disk read failed. [ 3209.327295] loop3: p2 p3 p4 [ 3209.346940] loop3: partition table partially beyond EOD, truncated [ 3209.365256] loop2: p2 < > p3 p4 [ 3209.368857] loop2: partition table partially beyond EOD, truncated [ 3209.373162] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3209.406648] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3209.421614] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3209.441406] loop2: p4 start 50331648 is beyond EOD, truncated 03:03:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x4a, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300706a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3209.453781] loop3: p3 start 225 is beyond EOD, truncated [ 3209.476526] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3209.482996] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3209.494810] loop5: p2 p3 p4 [ 3209.538710] loop5: p2 size 1073934333 extends beyond EOD, truncated 03:03:50 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003f88000da55aa", 0x40, 0x1c0}]) [ 3209.579892] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3209.658179] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3209.806301] loop2: p2 < > p3 p4 [ 3209.811501] loop2: partition table partially beyond EOD, truncated [ 3209.812311] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3209.842755] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3209.849616] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3209.856936] loop5: p2 p3 p4 [ 3209.858072] loop2: p4 start 50331648 is beyond EOD, truncated [ 3209.863894] loop5: p2 size 1073934333 extends beyond EOD, truncated [ 3209.876967] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3209.888712] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:50 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000000000effd024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300707a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x67, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000953daf5dadda58994a6a84ad46a210e2952109c0c42f490936d9fd3ea7da9675ef21340e2c4bf2cd59c73de653e22065cd624df723389de4b4ba887019b596350be0965e1e4a2f05e669dd3c610ed9cbe906bea0107176bbc9681dcf4c2db79f4e456e0610b806263aa86bbbc5cdfb1442f72ac5b468a3563b063b7e16b3ecee10b97a286ef6eadafc6493aa508905a78badc9f0a0b19cc60e6ade328db58dc5dbdb4a2e60f29ff30f2706893a23d6dfde450be65eced990fb0a87773068c7ea38cb44315179d5d81c1e32fff3e5caaa9db7a2553aa2780b37"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) (async) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route_sched(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e000000953daf5dadda58994a6a84ad46a210e2952109c0c42f490936d9fd3ea7da9675ef21340e2c4bf2cd59c73de653e22065cd624df723389de4b4ba887019b596350be0965e1e4a2f05e669dd3c610ed9cbe906bea0107176bbc9681dcf4c2db79f4e456e0610b806263aa86bbbc5cdfb1442f72ac5b468a3563b063b7e16b3ecee10b97a286ef6eadafc6493aa508905a78badc9f0a0b19cc60e6ade328db58dc5dbdb4a2e60f29ff30f2706893a23d6dfde450be65eced990fb0a87773068c7ea38cb44315179d5d81c1e32fff3e5caaa9db7a2553aa2780b37"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r6}, 0x10) (async) 03:03:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a090000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:50 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000407f88000da55aa", 0x40, 0x1c0}]) 03:03:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x7c4, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300708a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3210.068392] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3210.099598] ldm_validate_privheads(): Disk read failed. [ 3210.112221] loop3: p2 p3 p4 [ 3210.134032] loop3: partition table partially beyond EOD, truncated [ 3210.146301] loop2: p2 < > p3 p4 [ 3210.149796] loop2: partition table partially beyond EOD, truncated 03:03:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x4, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3210.178065] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3210.189707] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3210.202548] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3210.216955] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300709a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x402, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3210.275718] loop2: p4 start 117702656 is beyond EOD, truncated [ 3210.284139] loop3: p3 start 225 is beyond EOD, truncated [ 3210.290659] loop5: p2 p3 p4 [ 3210.303613] loop5: p2 size 1073937903 extends beyond EOD, truncated [ 3210.318148] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:03:50 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff004a258df98000da55aa", 0x40, 0x1c0}]) [ 3210.373481] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3210.439221] 8021q: adding VLAN 0 to HW filter on device batadv4154 [ 3210.495969] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3210.519719] bond5068: Enslaving batadv4154 as a backup interface with an up link [ 3210.606469] loop2: p2 < > p3 p4 [ 3210.609990] loop2: partition table partially beyond EOD, truncated [ 3210.664051] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3210.687049] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3210.702500] loop2: p4 start 2368031232 is beyond EOD, truncated 03:03:51 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000002024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030070aa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000500024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a100000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3210.719096] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3210.733892] loop5: p2 p3 p4 [ 3210.738906] loop5: p2 size 1073937903 extends beyond EOD, truncated [ 3210.747373] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3210.756013] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:51 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003fa8000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000500024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300710a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x404, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000500024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3210.959338] ldm_validate_privheads(): Disk read failed. [ 3210.983393] loop3: p2 p3 p4 03:03:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300712a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x405, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3211.009715] loop3: partition table partially beyond EOD, truncated [ 3211.044284] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3211.059721] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3211.085518] loop2: p2 < > p3 p4 [ 3211.089001] loop2: partition table partially beyond EOD, truncated [ 3211.096868] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3211.106090] loop3: p3 start 225 is beyond EOD, truncated [ 3211.114724] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3211.117148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3211.129613] loop5: p2 p3 p4 [ 3211.137707] loop5: p2 size 1073873408 extends beyond EOD, truncated [ 3211.157372] loop2: p4 start 50331648 is beyond EOD, truncated [ 3211.166120] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3211.197954] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3211.370433] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3211.380403] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3211.390771] loop5: p2 p3 p4 [ 3211.400259] loop5: p2 size 1073873408 extends beyond EOD, truncated [ 3211.438989] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3211.486177] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3211.639367] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3211.664896] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3211.681196] loop5: p2 p3 p4 03:03:52 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000003024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xf8000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030071ca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x406, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:52 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003fc8000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a230000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3211.684566] loop5: p2 size 1073873408 extends beyond EOD, truncated [ 3211.692437] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3211.700231] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300723a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3211.835661] ldm_validate_privheads(): Disk read failed. [ 3211.841242] loop3: p2 p3 p4 [ 3211.849226] loop3: partition table partially beyond EOD, truncated [ 3211.863381] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3211.880941] loop2: p2 < > p3 p4 03:03:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300748a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3211.889955] loop2: partition table partially beyond EOD, truncated [ 3211.892840] loop3: p3 start 225 is beyond EOD, truncated [ 3211.906349] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3211.922459] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3211.955341] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3211.955993] loop2: p4 start 50331648 is beyond EOD, truncated 03:03:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030074ca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000002024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x408, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3211.995969] ldm_validate_privheads(): Disk read failed. [ 3212.011610] loop3: p2 p3 p4 [ 3212.021599] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3212.029943] loop3: partition table partially beyond EOD, truncated [ 3212.060840] loop5: p2 p3 p4 [ 3212.080655] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3212.092002] loop5: p2 size 1073873664 extends beyond EOD, truncated [ 3212.110828] loop3: p3 start 225 is beyond EOD, truncated [ 3212.140845] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3212.158224] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3212.280594] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:53 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000004024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300754a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00fffffffd8000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000002024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x409, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a480000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030075aa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3212.769125] ldm_validate_privheads(): Disk read failed. [ 3212.792205] loop3: p2 p3 p4 [ 3212.801518] loop3: partition table partially beyond EOD, truncated 03:03:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000002024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x40a, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3212.817909] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3212.828586] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3212.856826] loop2: p2 < > p3 p4 [ 3212.860343] loop2: partition table partially beyond EOD, truncated [ 3212.869938] loop3: p3 start 225 is beyond EOD, truncated [ 3212.871022] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3212.887223] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3212.921004] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3212.929647] loop2: p4 start 4294967040 is beyond EOD, truncated [ 3212.980731] loop5: p2 p3 p4 03:03:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003fe8000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000014000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3213.030887] loop5: p2 size 1073873920 extends beyond EOD, truncated [ 3213.064552] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:03:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030075ca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3213.161751] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3213.465388] loop2: p2 < > p3 p4 [ 3213.468955] loop2: partition table partially beyond EOD, truncated [ 3213.512012] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3213.525149] loop2: p4 start 50331648 is beyond EOD, truncated 03:03:53 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000005024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x410, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a4c0000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030075ea6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000fffffffe024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000407ff8000da55aa", 0x40, 0x1c0}]) [ 3213.592466] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3213.628489] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x414, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300760a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000fffffffe024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3213.644923] loop5: p2 p3 p4 [ 3213.648169] loop5: p2 size 1073873920 extends beyond EOD, truncated [ 3213.683467] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300768a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3213.710429] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3213.722640] ldm_validate_privheads(): Disk read failed. [ 3213.740412] loop3: p2 p3 p4 [ 3213.762352] loop3: partition table partially beyond EOD, truncated [ 3213.780328] loop2: p2 < > p3 p4 [ 3213.783874] loop2: partition table partially beyond EOD, truncated [ 3213.788249] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030076ca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3213.818703] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3213.866289] loop3: p3 start 225 is beyond EOD, truncated [ 3213.886279] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3213.898075] loop2: p4 start 117702656 is beyond EOD, truncated [ 3213.932542] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3213.976873] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3214.022480] loop5: p2 p3 p4 [ 3214.032096] loop5: p2 size 1073874176 extends beyond EOD, truncated [ 3214.068856] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3214.149452] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:54 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000007024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000fffffffe024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300774a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a600000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000000fff8000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3214.200514] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3214.211374] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3214.219958] loop5: p2 p3 p4 [ 3214.223250] loop5: p2 size 1073874176 extends beyond EOD, truncated [ 3214.231249] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3214.239148] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a576ffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300778a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a576ffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3214.393851] ldm_validate_privheads(): Disk read failed. [ 3214.409602] loop3: p2 p3 p4 [ 3214.421824] loop2: p2 < > p3 p4 [ 3214.433685] loop2: partition table partially beyond EOD, truncated 03:03:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030077aa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3214.449435] loop3: partition table partially beyond EOD, truncated [ 3214.473158] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3214.495820] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3214.512108] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3214.538367] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a576ffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3214.543540] loop2: p4 start 251658240 is beyond EOD, truncated [ 3214.582984] loop3: p3 start 225 is beyond EOD, truncated [ 3214.595081] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3214.602114] loop5: p2 p3 p4 [ 3214.687072] loop5: p2 size 1073874688 extends beyond EOD, truncated [ 3214.738838] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3214.792102] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030078ca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000fffff8000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a680000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="fc01a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000000000000a4000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3214.845197] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3214.856639] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3214.862828] loop5: p2 p3 p4 [ 3214.866155] loop5: p2 size 1073874688 extends beyond EOD, truncated [ 3214.874287] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3214.883236] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="fc01a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300798a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3215.038962] loop2: p2 < > p3 p4 [ 3215.043343] loop2: partition table partially beyond EOD, truncated 03:03:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3215.084963] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3215.109591] ldm_validate_privheads(): Disk read failed. [ 3215.121216] loop3: p2 p3 p4 [ 3215.128848] loop2: p4 start 4279173120 is beyond EOD, truncated 03:03:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="fc01a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007a8a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3215.147586] loop3: partition table partially beyond EOD, truncated [ 3215.157414] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3215.179930] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3215.192495] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:03:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3215.227532] loop5: p2 p3 p4 [ 3215.229714] loop3: p3 start 225 is beyond EOD, truncated [ 3215.261813] loop5: p2 size 1074397184 extends beyond EOD, truncated 03:03:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff007fffffff8000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000021000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3215.282214] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3215.385311] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:03:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a6c0000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007aaa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3215.446527] loop2: p2 < > p3 p4 [ 3215.453086] loop2: partition table partially beyond EOD, truncated [ 3215.455969] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3215.472830] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3215.506827] loop2: p4 start 4294934272 is beyond EOD, truncated [ 3215.600347] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3215.648744] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3215.659364] ldm_validate_privheads(): Disk read failed. [ 3215.666452] loop3: p2 p3 p4 [ 3215.669688] loop3: partition table partially beyond EOD, truncated [ 3215.678149] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3215.698303] loop3: p3 start 225 is beyond EOD, truncated [ 3215.704327] loop5: p2 p3 p4 [ 3215.707591] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3215.714415] loop5: p2 size 1074397184 extends beyond EOD, truncated [ 3215.730464] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3215.773007] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:56 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000044000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000021000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:56 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0097ffffff8000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007b0a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a740000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007b8a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000021000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3216.011938] loop2: p2 < > p3 p4 [ 3216.022424] loop2: partition table partially beyond EOD, truncated [ 3216.041103] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:03:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007bca6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3216.057246] loop2: p4 start 4294940416 is beyond EOD, truncated [ 3216.071921] ldm_validate_privheads(): Disk read failed. [ 3216.089074] loop3: p2 p3 p4 03:03:56 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00c9ffffff8000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000004000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3216.118232] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3216.138804] loop3: partition table partially beyond EOD, truncated [ 3216.192557] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3216.232492] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3216.251272] loop5: p2 p3 p4 [ 3216.267114] loop3: p3 start 225 is beyond EOD, truncated [ 3216.279182] loop5: p2 size 1074003968 extends beyond EOD, truncated [ 3216.288246] loop2: p2 < > p3 p4 [ 3216.288962] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3216.291762] loop2: partition table partially beyond EOD, truncated [ 3216.323539] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3216.336023] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3216.344120] loop2: p4 start 4294953216 is beyond EOD, truncated [ 3216.411637] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:56 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000000000000a4000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007c4a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000004000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:56 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00e4ffffff8000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a7a0000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3216.470458] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3216.480497] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3216.489142] loop5: p2 p3 p4 [ 3216.492638] loop5: p2 size 1074003968 extends beyond EOD, truncated [ 3216.502356] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3216.511806] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000004000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007caa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0701a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3216.656926] loop2: p2 < > p3 p4 [ 3216.660460] loop2: partition table partially beyond EOD, truncated 03:03:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0701a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007d0a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3216.700390] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3216.723326] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3216.740958] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3216.765187] loop2: p4 start 4294960128 is beyond EOD, truncated [ 3216.767449] loop5: p2 p3 p4 [ 3216.810048] ldm_validate_privheads(): Disk read failed. [ 3216.812199] loop5: p2 size 1074397184 extends beyond EOD, truncated [ 3216.821814] loop3: p2 p3 p4 [ 3216.848405] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3216.853809] loop3: partition table partially beyond EOD, truncated [ 3216.865718] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3216.913569] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3217.043349] loop3: p3 start 225 is beyond EOD, truncated [ 3217.064685] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3217.197000] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3217.215228] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3217.229276] loop5: p2 p3 p4 [ 3217.232879] loop5: p2 size 1074397184 extends beyond EOD, truncated 03:03:57 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000000000000002effdffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0701a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00f5ffffff8000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007d8a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000300ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3217.242015] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3217.251399] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:03:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007e0a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000fffffff600024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xe, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007e8a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3217.411535] loop2: p2 < > p3 p4 [ 3217.420768] loop2: partition table partially beyond EOD, truncated [ 3217.448822] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3217.471163] loop2: p4 start 4294964480 is beyond EOD, truncated [ 3217.479851] ldm_validate_privheads(): Disk read failed. [ 3217.488778] loop3: p2 p3 p4 [ 3217.502528] loop3: partition table partially beyond EOD, truncated 03:03:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xf, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3217.516262] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000fffffff600024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3217.548813] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3217.563673] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3217.605778] loop5: unable to read partition table [ 3217.632673] loop3: p3 start 225 is beyond EOD, truncated [ 3217.638339] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3217.647642] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3217.657317] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3217.664040] loop5: unable to read partition table [ 3217.669495] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:03:58 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024002ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007f0a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00fdffffff8000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000004200080000fffffff600024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x10, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3217.866372] loop2: p2 < > p3 p4 [ 3217.875209] loop2: partition table partially beyond EOD, truncated 03:03:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a190300ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x12, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007f8a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800fffffff60000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3217.945905] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3217.966255] loop2: p4 start 4294966528 is beyond EOD, truncated [ 3217.983444] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x18, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3218.012369] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3218.047050] loop5: unable to read partition table 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300701fcffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3218.062543] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3218.080781] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800fffffff60000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3218.116240] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3218.141028] ldm_validate_privheads(): Disk read failed. [ 3218.149988] loop3: p2 p3 p4 [ 3218.161393] loop5: unable to read partition table 03:03:58 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024003ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000002000da55aa", 0x40, 0x1c0}]) [ 3218.167155] loop3: partition table partially beyond EOD, truncated 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 3218.210799] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800fffffff60000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3218.257329] loop3: p3 start 225 is beyond EOD, truncated [ 3218.295141] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3218.346430] loop2: p2 < > p3 p4 [ 3218.352884] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3218.407397] loop2: p4 size 3657441280 extends beyond EOD, truncated [ 3218.423378] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:03:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000500ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007004200000000000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@getneightbl={0x14, 0x42, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x10010) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r7}, 0x10) 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3218.459043] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3218.481459] loop5: unable to read partition table [ 3218.489376] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:03:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007005400000000000000008000da55aa", 0x40, 0x1c0}]) 03:03:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x22, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:59 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000004000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024004ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3218.636725] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:03:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e100000088770072003007005500000000000000008000da55aa", 0x40, 0x1c0}]) [ 3218.775487] ldm_validate_privheads(): Disk read failed. [ 3218.781519] loop3: p2 p3 p4 [ 3218.806166] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3218.811894] loop3: partition table partially beyond EOD, truncated [ 3218.834165] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3218.844456] loop5: unable to read partition table [ 3218.870651] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3218.885856] loop2: p2 < > p3 p4 [ 3218.896027] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3218.913364] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:03:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024005ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3218.945508] loop2: p4 size 3657449472 extends beyond EOD, truncated [ 3218.965660] loop3: p3 start 225 is beyond EOD, truncated [ 3218.986574] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:03:59 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000006000da55aa", 0x40, 0x1c0}]) [ 3219.096299] 8021q: adding VLAN 0 to HW filter on device batadv4156 [ 3219.153546] bond5069: Enslaving batadv4156 as a backup interface with an up link [ 3219.345408] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3219.360599] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3219.377647] loop5: unable to read partition table [ 3219.386381] loop2: p2 < > p3 p4 [ 3219.392615] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3219.403948] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3219.420538] loop2: p4 size 3657457664 extends beyond EOD, truncated 03:03:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000600ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x24, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:03:59 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024003ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024007ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:03:59 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000007100da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a9ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024003ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700eeffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3219.726319] loop2: p2 < > p3 p4 [ 3219.736163] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3219.754370] loop2: p4 size 3657462016 extends beyond EOD, truncated [ 3219.785429] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3219.808143] ldm_validate_privheads(): Disk read failed. [ 3219.812089] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3219.813988] loop3: p2 p3 p4 03:04:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024003ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3219.840091] loop5: unable to read partition table 03:04:00 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000007f00da55aa", 0x40, 0x1c0}]) [ 3219.873380] loop3: partition table partially beyond EOD, truncated [ 3219.878028] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3219.917183] loop3: p3 start 225 is beyond EOD, truncated [ 3219.929831] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3219.973730] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3220.086137] loop2: p2 < > p3 p4 [ 3220.097008] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3220.111270] loop2: p4 size 3657465600 extends beyond EOD, truncated 03:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000700ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82020000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700fdffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x30, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x74000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000200008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a2ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x18020000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x34, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3220.354702] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3220.365257] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3220.408920] loop5: p2 p3 p4 [ 3220.416967] loop2: p2 < > p3 p4 [ 3220.427658] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3220.431794] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3220.447255] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 3220.470103] ldm_validate_privheads(): Disk read failed. [ 3220.479975] loop3: p2 p3 p4 03:04:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a3ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x60000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x36, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3220.511103] loop3: partition table partially beyond EOD, truncated [ 3220.546335] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3220.565467] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3220.616783] loop3: p3 start 225 is beyond EOD, truncated [ 3220.620821] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3220.646393] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3220.711138] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3220.728472] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3220.743394] loop5: p2 p3 p4 [ 3220.750515] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3220.783565] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3220.793758] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a4ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82030000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000300008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000300000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000900ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a5ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 1: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1ba01008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x42, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a6ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x4c000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a7ff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3221.210955] ldm_validate_privheads(): Disk read failed. [ 3221.223715] loop2: p2 < > p3 p4 [ 3221.226076] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3221.238955] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3221.247004] loop3: p2 p3 p4 [ 3221.251139] loop3: partition table partially beyond EOD, truncated [ 3221.255530] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3221.263147] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3221.270781] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 3221.300844] loop5: p2 p3 p4 03:04:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800030000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3221.312815] loop3: p3 start 225 is beyond EOD, truncated [ 3221.323709] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3221.341507] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3221.363824] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3221.440325] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3221.506350] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3221.517831] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3221.527973] loop5: p2 p3 p4 [ 3221.537857] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3221.583152] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3221.618845] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:02 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82040000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x44, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a8ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000400008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00033000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a031900ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6a9ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00033000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x48, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3222.029697] ldm_validate_privheads(): Disk read failed. [ 3222.053321] loop3: p2 p3 p4 [ 3222.064463] loop3: partition table partially beyond EOD, truncated [ 3222.082304] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6aaff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00033000008000da55aa", 0x40, 0x1c0}]) [ 3222.129476] loop2: p2 < > p3 p4 [ 3222.132970] loop3: p3 start 225 is beyond EOD, truncated [ 3222.134523] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3222.149088] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3222.170916] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3222.191663] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 3222.199696] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3222.202548] ldm_validate_privheads(): Disk read failed. [ 3222.213167] loop3: p2 p3 p4 [ 3222.223233] loop3: partition table partially beyond EOD, truncated 03:04:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3222.225793] loop5: p2 p3 p4 [ 3222.247483] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3222.304654] loop3: p3 start 225 is beyond EOD, truncated [ 3222.307051] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3222.310442] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3222.377339] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3222.425829] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:02 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82050000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6abff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00032c00008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000500008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001f00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3222.469224] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3222.479584] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3222.486703] loop5: p2 p3 p4 [ 3222.490160] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3222.499294] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3222.511346] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6acff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x52, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:03 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00032c00008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6adff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3222.667031] loop2: p2 < > p3 p4 [ 3222.670627] loop2: partition table partially beyond EOD, truncated [ 3222.706133] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:03 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00032c00008000da55aa", 0x40, 0x1c0}]) [ 3222.729166] ldm_validate_privheads(): Disk read failed. [ 3222.735751] loop2: p4 start 327680 is beyond EOD, truncated [ 3222.746278] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3222.747015] loop3: p2 p3 p4 [ 3222.764470] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3222.781968] loop5: p2 p3 p4 [ 3222.790691] loop3: partition table partially beyond EOD, truncated [ 3222.792870] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x60, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3222.822281] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3222.837695] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3222.853341] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3222.899601] loop3: p3 start 225 is beyond EOD, truncated [ 3222.915698] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3222.933825] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3222.933952] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3222.941471] loop5: p2 p3 p4 [ 3222.983771] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3223.041591] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3223.084383] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3223.218135] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3223.237549] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3223.251865] loop5: p2 p3 p4 [ 3223.261009] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:03 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82070000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000600008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6aeff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x68, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a002000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3223.279204] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3223.296782] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6afff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b0ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3223.427223] loop2: p2 < > p3 p4 [ 3223.431515] loop2: partition table partially beyond EOD, truncated [ 3223.489758] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3223.517745] loop2: p4 start 393216 is beyond EOD, truncated [ 3223.528777] ldm_validate_privheads(): Disk read failed. [ 3223.534729] loop3: p2 p3 p4 03:04:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001f00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b1ff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3223.554144] loop3: partition table partially beyond EOD, truncated [ 3223.572655] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3223.581251] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:04 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000700008000da55aa", 0x40, 0x1c0}]) [ 3223.617733] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3223.623859] loop3: p3 start 225 is beyond EOD, truncated [ 3223.653811] loop5: p2 p3 p4 [ 3223.670362] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3223.689767] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3223.820148] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3223.826784] loop2: p2 < > p3 p4 [ 3223.826799] loop2: partition table partially beyond EOD, truncated [ 3223.828327] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3223.852891] loop2: p4 start 458752 is beyond EOD, truncated [ 3223.906289] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3224.023591] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3224.044936] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3224.051198] loop5: p2 p3 p4 [ 3224.054464] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3224.064561] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:04 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000300e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x74, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001f00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b2ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a002300ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000800008000da55aa", 0x40, 0x1c0}]) [ 3224.073149] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001f00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b3ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000000000000a4000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3224.242749] ldm_validate_privheads(): Disk read failed. [ 3224.273373] loop3: p2 p3 p4 [ 3224.282331] loop3: partition table partially beyond EOD, truncated [ 3224.296756] loop2: p2 < > p3 p4 [ 3224.300348] loop2: partition table partially beyond EOD, truncated [ 3224.322401] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3224.336597] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b4ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3224.358173] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3224.373151] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3224.385718] loop2: p4 start 524288 is beyond EOD, truncated [ 3224.413056] loop5: p2 p3 p4 [ 3224.418152] loop3: p3 start 225 is beyond EOD, truncated [ 3224.435626] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3224.439282] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3224.491763] ldm_validate_privheads(): Disk read failed. [ 3224.511015] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3224.516119] loop3: p2 p3 p4 [ 3224.533283] loop3: partition table partially beyond EOD, truncated [ 3224.575716] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3224.597449] loop3: p3 start 225 is beyond EOD, truncated [ 3224.603691] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3224.603916] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3224.778467] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3224.792438] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3224.802401] loop5: p2 p3 p4 [ 3224.806657] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3224.814445] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:05 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000500e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008000000000000000a4000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000900008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b5ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a004800ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3224.823438] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b6ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 1: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10401008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b7ff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3225.016930] loop2: p2 < > p3 p4 [ 3225.020342] loop2: partition table partially beyond EOD, truncated [ 3225.036358] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x48000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3225.065524] loop2: p4 start 589824 is beyond EOD, truncated [ 3225.090835] ldm_validate_privheads(): Disk read failed. [ 3225.100916] loop2: p2 < > p3 p4 [ 3225.104546] loop2: partition table partially beyond EOD, truncated [ 3225.115480] loop3: p2 p3 p4 [ 3225.127771] loop3: partition table partially beyond EOD, truncated 03:04:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3225.140011] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3225.141815] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3225.160439] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3225.173716] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3225.195184] loop5: p2 p3 p4 [ 3225.222782] loop2: p4 start 589824 is beyond EOD, truncated [ 3225.225604] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3225.242004] loop3: p3 start 225 is beyond EOD, truncated [ 3225.253379] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3225.298445] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3225.350061] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3225.486493] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3225.525251] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3225.532531] loop5: p2 p3 p4 03:04:05 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000700e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b8ff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00022800008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xcc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:05 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000e00008000da55aa", 0x40, 0x1c0}]) 03:04:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a004c00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3225.538423] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3225.547717] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3225.557093] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6b9ff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3225.686651] loop2: p2 < > p3 p4 [ 3225.690114] loop2: partition table partially beyond EOD, truncated [ 3225.717779] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:06 executing program 1: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e1e800008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6baff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3225.739688] ldm_validate_privheads(): Disk read failed. [ 3225.747893] loop3: p2 p3 p4 [ 3225.761304] loop3: partition table partially beyond EOD, truncated [ 3225.769995] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3225.781335] loop2: p4 start 917504 is beyond EOD, truncated 03:04:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xd0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x41a9e50b, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3225.799570] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3225.816036] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3225.832854] loop3: p3 start 225 is beyond EOD, truncated [ 3225.844829] loop2: p2 < > p3 p4 [ 3225.848744] loop2: partition table partially beyond EOD, truncated [ 3225.858291] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3225.860295] loop5: p2 p3 p4 [ 3225.884751] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6bbff1700000000008000da55aa", 0x40, 0x1c0}]) [ 3225.948032] loop2: p4 start 917504 is beyond EOD, truncated [ 3225.959523] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3226.072119] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3226.183891] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3226.238497] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3226.260529] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3226.267222] loop5: p2 p3 p4 [ 3226.270561] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3226.278846] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:06 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82fdef00e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008f6ffffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xd4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:06 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6bcff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3226.286833] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xc000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6bdff1700000000008000da55aa", 0x40, 0x1c0}]) 03:04:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xe0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3226.456629] ldm_validate_privheads(): Disk read failed. [ 3226.463254] loop3: p2 p3 p4 [ 3226.480203] loop3: partition table partially beyond EOD, truncated [ 3226.497632] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3226.536922] loop2: p2 < > p3 p4 [ 3226.540699] loop2: partition table partially beyond EOD, truncated [ 3226.546967] loop3: p3 start 225 is beyond EOD, truncated [ 3226.554878] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3226.571462] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3226.582121] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a64fffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3226.609992] loop2: p4 start 1048576 is beyond EOD, truncated [ 3226.619141] ldm_validate_privheads(): Disk read failed. [ 3226.636197] loop3: p2 p3 p4 [ 3226.646559] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xe8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3226.660211] loop3: partition table partially beyond EOD, truncated [ 3226.683304] loop5: p2 p3 p4 [ 3226.699359] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00012400008000da55aa", 0x40, 0x1c0}]) [ 3226.705932] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3226.710010] loop3: p3 start 225 is beyond EOD, truncated [ 3226.710022] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3226.801682] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3226.892116] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3226.961151] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3226.978725] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3226.991340] loop5: p2 p3 p4 [ 3226.994599] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3227.003309] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:07 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82effd00e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ff4fff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001c00008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006800ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xf0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008fcfdffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3227.011714] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffff4f00000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008fcfdffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffc01000000008000da55aa", 0x40, 0x1c0}]) 03:04:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xf4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02000000008000da55aa", 0x40, 0x1c0}]) [ 3227.216207] loop2: p2 < > p3 p4 [ 3227.221855] loop2: partition table partially beyond EOD, truncated [ 3227.251525] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3227.282600] ldm_validate_privheads(): Disk read failed. [ 3227.291169] loop3: p2 p3 p4 [ 3227.307212] loop2: p4 start 1835008 is beyond EOD, truncated [ 3227.314450] loop3: partition table partially beyond EOD, truncated [ 3227.332263] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3227.351078] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3227.368435] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3227.390230] loop5: p2 p3 p4 [ 3227.413835] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3227.492075] loop3: p3 start 225 is beyond EOD, truncated [ 3227.501861] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3227.553691] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3227.564016] ldm_validate_privheads(): Disk read failed. [ 3227.576358] loop3: p2 p3 p4 [ 3227.579514] loop3: partition table partially beyond EOD, truncated [ 3227.587958] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3227.597245] loop3: p3 start 225 is beyond EOD, truncated [ 3227.599974] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3227.603136] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:08 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000200e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xf8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008effdffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00002300008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006c00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff04000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x23000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3227.807199] loop2: p2 < > p3 p4 [ 3227.810938] loop2: partition table partially beyond EOD, truncated 03:04:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x104, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3227.848105] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3227.863247] ldm_validate_privheads(): Disk read failed. [ 3227.882890] loop3: p2 p3 p4 03:04:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x23000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3227.895859] loop3: partition table partially beyond EOD, truncated [ 3227.910360] loop2: p4 start 2293760 is beyond EOD, truncated [ 3227.925059] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3227.930079] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff05000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x11a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3227.980447] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3227.993748] loop5: p2 p3 p4 [ 3228.009154] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3228.011751] loop3: p3 start 225 is beyond EOD, truncated [ 3228.040843] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3228.087228] ldm_validate_privheads(): Disk read failed. [ 3228.092672] loop3: p2 p3 p4 [ 3228.102145] loop3: partition table partially beyond EOD, truncated [ 3228.109281] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3228.112118] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3228.132016] loop3: p3 start 225 is beyond EOD, truncated [ 3228.140861] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3228.172132] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3228.252393] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3228.275971] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3228.282222] loop5: p2 p3 p4 [ 3228.289409] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:08 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000300e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x23000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00004800008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff06000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x11c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a007400ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3228.300049] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3228.309161] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff07000000008000da55aa", 0x40, 0x1c0}]) 03:04:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008fffffffe000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3228.430680] loop2: p2 < > p3 p4 [ 3228.434142] loop2: partition table partially beyond EOD, truncated 03:04:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x128, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3228.474195] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3228.476323] ldm_validate_privheads(): Disk read failed. 03:04:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000420008fffffdfc000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3228.515393] loop3: p2 p3 p4 [ 3228.523112] loop3: partition table partially beyond EOD, truncated [ 3228.538340] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3228.541964] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff08000000008000da55aa", 0x40, 0x1c0}]) [ 3228.563775] loop2: p4 start 4718592 is beyond EOD, truncated [ 3228.581577] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3228.583129] loop3: p3 start 225 is beyond EOD, truncated 03:04:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x12c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3228.617936] loop5: p2 p3 p4 [ 3228.652949] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3228.655781] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3228.705002] ldm_validate_privheads(): Disk read failed. [ 3228.723478] loop3: p2 p3 p4 [ 3228.737281] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3228.738741] loop3: partition table partially beyond EOD, truncated [ 3228.788271] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3228.792000] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3228.847997] loop3: p3 start 225 is beyond EOD, truncated [ 3228.867475] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:09 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000400e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00004c00008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000021000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff09000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x12e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a007a00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0a000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x13a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3229.106459] loop2: p2 < > p3 p4 [ 3229.111316] loop2: partition table partially beyond EOD, truncated [ 3229.182280] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3229.199781] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3229.213245] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff10000000008000da55aa", 0x40, 0x1c0}]) [ 3229.234015] loop2: p4 start 4980736 is beyond EOD, truncated [ 3229.249539] ldm_validate_privheads(): Disk read failed. [ 3229.263743] loop3: p2 p3 p4 [ 3229.274431] loop3: partition table partially beyond EOD, truncated 03:04:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff12000000008000da55aa", 0x40, 0x1c0}]) 03:04:09 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00006000008000da55aa", 0x40, 0x1c0}]) [ 3229.288337] loop5: p2 p3 p4 [ 3229.297961] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3229.319312] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3229.397165] loop3: p3 start 225 is beyond EOD, truncated [ 3229.433632] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3229.443176] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3229.446492] loop2: p2 < > p3 p4 [ 3229.453109] loop2: partition table partially beyond EOD, truncated [ 3229.482703] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3229.484971] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3229.525306] loop2: p4 start 6291456 is beyond EOD, truncated [ 3229.570238] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3229.612514] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3229.655356] loop5: p2 p3 p4 [ 3229.662259] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3229.683090] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3229.700179] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:10 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000500e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800f0ff1f000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x150, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff1c000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a0fff00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00006800008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff23000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800f0ff1f000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x158, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff48000000008000da55aa", 0x40, 0x1c0}]) [ 3229.907419] ldm_validate_privheads(): Disk read failed. [ 3229.913482] loop3: p2 p3 p4 [ 3229.963625] loop3: partition table partially beyond EOD, truncated [ 3229.963918] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff4c000000008000da55aa", 0x40, 0x1c0}]) [ 3230.007695] loop2: p2 < > p3 p4 [ 3230.011304] loop2: partition table partially beyond EOD, truncated [ 3230.034178] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3230.070374] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3230.077823] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3230.107257] loop5: p2 p3 p4 [ 3230.110809] loop2: p4 start 6815744 is beyond EOD, truncated [ 3230.116469] loop3: p3 start 225 is beyond EOD, truncated [ 3230.132163] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3230.158788] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3230.234267] ldm_validate_privheads(): Disk read failed. [ 3230.247764] loop3: p2 p3 p4 [ 3230.261548] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3230.286735] loop3: partition table partially beyond EOD, truncated [ 3230.301012] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3230.329971] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3230.338349] loop3: p3 start 225 is beyond EOD, truncated [ 3230.344292] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff54000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x15a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:10 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00006c00008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800001008000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000700e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000200ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff5a000000008000da55aa", 0x40, 0x1c0}]) 03:04:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x4010000, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x160, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff5c000000008000da55aa", 0x40, 0x1c0}]) [ 3230.570040] ldm_validate_privheads(): Disk read failed. [ 3230.582116] loop3: p2 p3 p4 [ 3230.596619] loop2: p2 < > p3 p4 [ 3230.597244] loop3: partition table partially beyond EOD, truncated [ 3230.602132] loop2: partition table partially beyond EOD, truncated [ 3230.630942] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3230.647460] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3230.664819] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3230.672227] loop3: p3 start 225 is beyond EOD, truncated 03:04:11 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff5e000000008000da55aa", 0x40, 0x1c0}]) [ 3230.681535] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3230.698614] loop2: p4 start 7077888 is beyond EOD, truncated [ 3230.700100] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3230.727517] loop5: p2 p3 p4 03:04:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x16c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3230.754503] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3230.775043] ldm_validate_privheads(): Disk read failed. [ 3230.788073] loop3: p2 p3 p4 03:04:11 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff60000000008000da55aa", 0x40, 0x1c0}]) [ 3230.798400] loop3: partition table partially beyond EOD, truncated [ 3230.825181] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3230.838827] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:11 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00007400008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3230.863766] loop3: p3 start 225 is beyond EOD, truncated [ 3230.875080] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3230.942449] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3230.996074] loop2: p2 < > p3 p4 [ 3230.999587] loop2: partition table partially beyond EOD, truncated [ 3231.058941] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3231.090277] loop2: p4 start 7602176 is beyond EOD, truncated [ 3231.097876] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:11 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000003e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff68000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000300ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x170, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:11 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00007a00008000da55aa", 0x40, 0x1c0}]) [ 3231.113912] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3231.121634] loop5: p2 p3 p4 [ 3231.125135] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3231.134894] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3231.144043] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:11 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff6c000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x178, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x7400, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff74000000008000da55aa", 0x40, 0x1c0}]) 03:04:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6800, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3231.311290] ldm_validate_privheads(): Disk read failed. [ 3231.321718] loop3: p2 p3 p4 [ 3231.337482] loop3: partition table partially beyond EOD, truncated [ 3231.346776] loop2: p2 < > p3 p4 [ 3231.350513] loop2: partition table partially beyond EOD, truncated 03:04:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x180, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3231.384559] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3231.389586] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3231.401378] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3231.428283] loop2: p4 start 7995392 is beyond EOD, truncated [ 3231.433105] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3231.465734] loop5: p2 p3 p4 [ 3231.484300] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3231.485689] loop3: p3 start 225 is beyond EOD, truncated [ 3231.514121] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3231.598926] ldm_validate_privheads(): Disk read failed. [ 3231.609192] loop3: p2 p3 p4 [ 3231.612444] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3231.619609] loop3: partition table partially beyond EOD, truncated [ 3231.651548] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3231.671720] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3231.676419] loop3: p3 start 225 is beyond EOD, truncated [ 3231.687406] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:12 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000005e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff78000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6800, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x182, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:12 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000de00008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000400ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff7a000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x184, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x6800, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff8c000000008000da55aa", 0x40, 0x1c0}]) [ 3232.056975] loop2: p2 < > p3 p4 [ 3232.060615] loop2: partition table partially beyond EOD, truncated 03:04:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x4c00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3232.116838] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3232.143321] ldm_validate_privheads(): Disk read failed. [ 3232.151059] loop3: p2 p3 p4 [ 3232.154786] loop2: p4 start 14548992 is beyond EOD, truncated [ 3232.157870] loop3: partition table partially beyond EOD, truncated 03:04:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x188, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3232.182979] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3232.199536] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3232.209459] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3232.238057] loop5: p2 p3 p4 [ 3232.252880] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3232.254245] loop3: p3 start 225 is beyond EOD, truncated [ 3232.301205] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3232.321246] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3232.380762] ldm_validate_privheads(): Disk read failed. [ 3232.388060] loop3: p2 p3 p4 [ 3232.396002] loop3: partition table partially beyond EOD, truncated [ 3232.402111] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3232.410880] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3232.428212] loop3: p3 start 225 is beyond EOD, truncated [ 3232.440459] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:12 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000007e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x4c00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff98000000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f000008000da55aa", 0x40, 0x1c0}]) 03:04:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x194, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000500ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x198, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:13 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa8000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x4c00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3232.720770] ldm_validate_privheads(): Disk read failed. [ 3232.727548] loop3: p2 p3 p4 [ 3232.742121] loop3: partition table partially beyond EOD, truncated [ 3232.777965] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3232.792585] loop2: p2 < > p3 p4 [ 3232.799871] loop2: partition table partially beyond EOD, truncated [ 3232.817857] loop3: p3 start 225 is beyond EOD, truncated 03:04:13 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffaa000000008000da55aa", 0x40, 0x1c0}]) [ 3232.823446] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3232.843559] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3232.854853] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1a4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1f00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3232.887662] ldm_validate_privheads(): Disk read failed. [ 3232.893508] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3232.897145] loop2: p4 start 15728640 is beyond EOD, truncated [ 3232.910595] loop3: p2 p3 p4 [ 3232.924145] loop3: partition table partially beyond EOD, truncated [ 3232.941160] loop5: p2 p3 p4 [ 3232.946306] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3232.964839] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3232.967318] loop3: p3 start 225 is beyond EOD, truncated [ 3233.006845] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3233.041193] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3233.093006] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3233.194595] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3233.204610] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3233.211261] loop5: p2 p3 p4 [ 3233.214763] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3233.223474] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3233.232001] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:13 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff8200fdefe10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb0000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00002401008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1b0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1f00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000600ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1f00, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb8000000008000da55aa", 0x40, 0x1c0}]) [ 3233.387279] loop2: p2 < > p3 p4 [ 3233.390887] loop2: partition table partially beyond EOD, truncated [ 3233.420723] ldm_validate_privheads(): Disk read failed. [ 3233.434482] loop3: p2 p3 p4 [ 3233.446243] loop3: partition table partially beyond EOD, truncated [ 3233.449547] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1b2, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:13 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00800200008000da55aa", 0x40, 0x1c0}]) [ 3233.488068] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3233.508053] loop2: p4 start 19136512 is beyond EOD, truncated 03:04:13 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbc000000008000da55aa", 0x40, 0x1c0}]) 03:04:13 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00007a01008000da55aa", 0x40, 0x1c0}]) [ 3233.551285] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3233.564813] loop3: p3 start 225 is beyond EOD, truncated [ 3233.589482] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3233.603278] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3233.632643] loop5: p2 p3 p4 [ 3233.658212] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3233.670127] loop2: p2 < > p3 p4 [ 3233.676535] ldm_validate_privheads(): Disk read failed. [ 3233.682055] loop2: partition table partially beyond EOD, truncated [ 3233.689220] loop3: p2 p3 p4 [ 3233.692854] loop3: partition table partially beyond EOD, truncated [ 3233.706848] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3233.716938] loop3: p3 start 225 is beyond EOD, truncated [ 3233.722598] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3233.723825] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3233.748719] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3233.760123] loop2: p4 start 24772608 is beyond EOD, truncated [ 3233.799342] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:14 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff8200effde10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00800200008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1bc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:14 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffc4000000008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000700ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008c01008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffca000000008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00800200008000da55aa", 0x40, 0x1c0}]) [ 3234.097138] loop2: p2 < > p3 p4 [ 3234.100548] loop2: partition table partially beyond EOD, truncated 03:04:14 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd0000000008000da55aa", 0x40, 0x1c0}]) 03:04:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1c0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3234.139142] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3234.151326] ldm_validate_privheads(): Disk read failed. [ 3234.161563] loop3: p2 p3 p4 [ 3234.179018] loop3: partition table partially beyond EOD, truncated 03:04:14 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfffffff60042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3234.212470] loop2: p4 start 25952256 is beyond EOD, truncated [ 3234.233225] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3234.246421] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:14 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd8000000008000da55aa", 0x40, 0x1c0}]) [ 3234.261072] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3234.308749] loop3: p3 start 225 is beyond EOD, truncated [ 3234.320280] loop5: p2 p3 p4 [ 3234.333441] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3234.338217] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3234.423632] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3234.449972] ldm_validate_privheads(): Disk read failed. [ 3234.460547] loop3: p2 p3 p4 [ 3234.461151] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3234.470228] loop3: partition table partially beyond EOD, truncated [ 3234.471864] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3234.556399] loop3: p3 start 225 is beyond EOD, truncated [ 3234.563074] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:15 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000002e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:15 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000ac01008000da55aa", 0x40, 0x1c0}]) 03:04:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1ce, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x3bbbb3, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:15 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe0000000008000da55aa", 0x40, 0x1c0}]) 03:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000800ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:15 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe8000000008000da55aa", 0x40, 0x1c0}]) [ 3234.965465] ldm_validate_privheads(): Disk read failed. [ 3234.971495] loop3: p2 p3 p4 [ 3234.974647] loop3: partition table partially beyond EOD, truncated [ 3234.995479] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1d8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3235.029338] loop2: p2 < > p3 p4 [ 3235.031075] loop3: p3 start 225 is beyond EOD, truncated [ 3235.033236] loop2: partition table partially beyond EOD, truncated [ 3235.038517] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x5, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3235.099420] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3235.132513] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3235.156958] loop5: p2 p3 p4 [ 3235.160341] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3235.168048] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3235.170860] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3235.175927] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:15 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff0000000008000da55aa", 0x40, 0x1c0}]) 03:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000900ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3235.239065] loop2: p4 start 28049408 is beyond EOD, truncated 03:04:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1de, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3235.321571] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3235.355055] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3235.377283] loop5: p2 p3 p4 [ 3235.385322] ldm_validate_privheads(): Disk read failed. [ 3235.389286] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3235.395392] loop3: p2 p3 p4 [ 3235.407553] loop3: partition table partially beyond EOD, truncated [ 3235.439366] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3235.468159] loop3: p3 start 225 is beyond EOD, truncated [ 3235.470320] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3235.474759] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3235.532833] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:16 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000003e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000c401008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x5, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff8000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1f0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x5, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff04010000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1f8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:16 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) (fail_nth: 1) [ 3235.891008] ldm_validate_privheads(): Disk read failed. [ 3235.906460] loop3: p2 p3 p4 [ 3235.921904] loop3: partition table partially beyond EOD, truncated 03:04:16 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0c010000008000da55aa", 0x40, 0x1c0}]) [ 3235.950428] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3235.958180] loop2: p2 < > p3 p4 [ 3235.961744] loop2: partition table partially beyond EOD, truncated [ 3235.982340] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3235.993607] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3236.020778] loop3: p3 start 225 is beyond EOD, truncated [ 3236.030060] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3236.040604] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3236.058530] loop5: p2 p3 p4 03:04:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x202, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3236.082616] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3236.087361] loop2: p4 start 29622272 is beyond EOD, truncated [ 3236.271346] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3236.328480] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3236.411765] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3236.437492] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3236.443726] loop5: p2 p3 p4 [ 3236.447306] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3236.455397] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:16 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000004e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff26010000008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000cc01008000da55aa", 0x40, 0x1c0}]) 03:04:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x20c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a002300ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3236.464058] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:16 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff30010000008000da55aa", 0x40, 0x1c0}]) [ 3236.570319] loop2: p2 < > p3 p4 [ 3236.579866] loop2: partition table partially beyond EOD, truncated 03:04:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x214, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:17 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff58010000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000002, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3236.632007] ldm_validate_privheads(): Disk read failed. [ 3236.639507] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3236.644322] loop3: p2 p3 p4 [ 3236.662168] loop3: partition table partially beyond EOD, truncated [ 3236.671950] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:17 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff64010000008000da55aa", 0x40, 0x1c0}]) [ 3236.687960] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3236.703298] loop2: p4 start 30146560 is beyond EOD, truncated [ 3236.707735] loop3: p3 start 225 is beyond EOD, truncated [ 3236.715027] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3236.724411] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:17 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000de01008000da55aa", 0x40, 0x1c0}]) [ 3236.757659] loop5: p2 p3 p4 [ 3236.773701] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3236.833394] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3236.878850] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3236.976079] loop2: p2 < > p3 p4 [ 3236.979626] loop2: partition table partially beyond EOD, truncated [ 3237.004499] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3237.023963] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3237.032912] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3237.042142] loop2: p4 start 31326208 is beyond EOD, truncated [ 3237.108148] loop5: p2 p3 p4 [ 3237.118872] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3237.178917] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3237.213523] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:17 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000005e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff68010000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x218, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:17 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000003, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a004800ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000ea01008000da55aa", 0x40, 0x1c0}]) [ 3237.328343] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3237.337846] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3237.344116] loop5: p2 p3 p4 [ 3237.348099] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3237.358200] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3237.366226] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x21c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:17 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff74010000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000004, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:17 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff76010000008000da55aa", 0x40, 0x1c0}]) [ 3237.537631] loop2: p2 < > p3 p4 [ 3237.541334] loop2: partition table partially beyond EOD, truncated [ 3237.570766] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x220, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3237.610759] ldm_validate_privheads(): Disk read failed. [ 3237.620140] loop3: p2 p3 p4 [ 3237.623130] loop2: p4 start 32112640 is beyond EOD, truncated [ 3237.632097] loop3: partition table partially beyond EOD, truncated [ 3237.646322] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000005, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3237.668586] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3237.682620] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3237.703587] loop5: p2 p3 p4 [ 3237.735032] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3237.737363] loop3: p3 start 225 is beyond EOD, truncated [ 3237.776923] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3237.820443] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3237.930805] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3238.037136] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3238.059571] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3238.067461] loop5: p2 p3 p4 [ 3238.070694] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:18 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000007e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff82010000008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x228, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:18 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000ee01008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000007, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a004c00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3238.081780] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3238.090224] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:18 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff84010000008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000021, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x230, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:18 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff8c010000008000da55aa", 0x40, 0x1c0}]) [ 3238.247097] loop2: p2 < > p3 p4 [ 3238.250505] loop2: partition table partially beyond EOD, truncated [ 3238.280134] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000300, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3238.307074] loop2: p4 start 32374784 is beyond EOD, truncated [ 3238.309089] ldm_validate_privheads(): Disk read failed. [ 3238.333213] loop3: p2 p3 p4 [ 3238.342498] loop3: partition table partially beyond EOD, truncated [ 3238.370268] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:18 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000602008000da55aa", 0x40, 0x1c0}]) [ 3238.416693] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3238.428589] loop5: p2 p3 p4 [ 3238.434536] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3238.447625] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3238.467560] loop3: p3 start 225 is beyond EOD, truncated [ 3238.473312] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3238.552636] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3238.608042] loop2: p2 < > p3 p4 [ 3238.611547] loop2: partition table partially beyond EOD, truncated [ 3238.637612] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3238.652645] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3238.672980] loop2: p4 start 33947648 is beyond EOD, truncated [ 3238.696141] Bluetooth: hci0: command 0x0406 tx timeout [ 3238.742193] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3238.771444] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3238.779042] loop5: p2 p3 p4 [ 3238.782536] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff98010000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x232, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000500, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10200008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001e02008000da55aa", 0x40, 0x1c0}]) [ 3238.795263] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3238.803440] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa4010000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000700, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x240, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3238.927519] loop2: p2 < > p3 p4 [ 3238.931665] loop2: partition table partially beyond EOD, truncated [ 3238.963781] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3238.986972] ldm_validate_privheads(): Disk read failed. [ 3238.992898] loop3: p2 p3 p4 [ 3239.020611] loop3: partition table partially beyond EOD, truncated 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffba010000008000da55aa", 0x40, 0x1c0}]) [ 3239.033643] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3239.038266] loop2: p4 start 35520512 is beyond EOD, truncated [ 3239.065289] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3239.067690] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3239.100815] loop5: p2 p3 p4 03:04:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000001008, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x24a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbc010000008000da55aa", 0x40, 0x1c0}]) [ 3239.121190] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3239.134318] loop3: p3 start 225 is beyond EOD, truncated [ 3239.156954] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00002002008000da55aa", 0x40, 0x1c0}]) [ 3239.192491] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000002000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3239.292145] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3239.397291] loop2: p2 < > p3 p4 [ 3239.400797] loop2: partition table partially beyond EOD, truncated [ 3239.422494] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006800ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3239.443659] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3239.468753] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3239.478922] loop2: p4 start 35651584 is beyond EOD, truncated [ 3239.502276] loop5: p2 p3 p4 [ 3239.512359] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3239.533905] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:19 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10300008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffc8010000008000da55aa", 0x40, 0x1c0}]) 03:04:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x258, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000008008, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3239.550837] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:19 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffce010000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00002802008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x100000000effd, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3239.629976] ldm_validate_privheads(): Disk read failed. [ 3239.646822] loop3: p2 p3 p4 [ 3239.659143] loop3: partition table partially beyond EOD, truncated [ 3239.703226] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:20 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd8010000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x100000000fdef, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x260, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3239.785622] loop3: p3 start 225 is beyond EOD, truncated [ 3239.809482] loop2: p2 < > p3 p4 [ 3239.824047] loop2: partition table partially beyond EOD, truncated 03:04:20 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe6010000008000da55aa", 0x40, 0x1c0}]) [ 3239.847784] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3239.897375] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3239.924789] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3239.971250] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3239.973814] loop2: p4 start 36175872 is beyond EOD, truncated [ 3240.013699] loop5: p2 p3 p4 [ 3240.025370] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a006c00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3240.088569] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3240.153570] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3240.222798] ldm_validate_privheads(): Disk read failed. [ 3240.244951] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3240.257214] loop3: p2 p3 p4 [ 3240.266292] loop3: partition table partially beyond EOD, truncated [ 3240.275178] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3240.289048] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3240.293198] loop5: p2 p3 p4 [ 3240.300530] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3240.309284] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3240.318332] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3240.320698] loop3: p3 start 225 is beyond EOD, truncated [ 3240.366058] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:20 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10400008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000200000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff10020000008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x262, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:20 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00003c02008000da55aa", 0x40, 0x1c0}]) 03:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a007400ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000f0ff1f, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff1c020000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x278, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3240.677297] loop2: p2 < > p3 p4 [ 3240.680965] loop2: partition table partially beyond EOD, truncated [ 3240.699255] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3240.723856] loop2: p4 start 37486592 is beyond EOD, truncated 03:04:21 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000001000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff22020000008000da55aa", 0x40, 0x1c0}]) [ 3240.757049] ldm_validate_privheads(): Disk read failed. [ 3240.762894] loop3: p2 p3 p4 [ 3240.791272] loop3: partition table partially beyond EOD, truncated 03:04:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x288, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3240.791804] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3240.818368] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3240.834346] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3240.888526] loop3: p3 start 225 is beyond EOD, truncated [ 3240.894663] loop5: p2 p3 p4 [ 3240.911904] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3240.924440] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3240.969885] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3241.031726] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3241.116455] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3241.154131] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3241.162274] loop5: p2 p3 p4 03:04:21 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10500008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00004a02008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff28020000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000002000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x28a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a007a00ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3241.165569] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3241.173641] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3241.182422] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff30020000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000003000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x28c, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff40020000008000da55aa", 0x40, 0x1c0}]) [ 3241.339432] loop2: p2 < > p3 p4 [ 3241.343030] loop2: partition table partially beyond EOD, truncated [ 3241.375356] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:21 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000004000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3241.403488] loop2: p4 start 38404096 is beyond EOD, truncated [ 3241.416613] ldm_validate_privheads(): Disk read failed. [ 3241.422492] loop3: p2 p3 p4 [ 3241.425653] loop3: partition table partially beyond EOD, truncated 03:04:21 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff58020000008000da55aa", 0x40, 0x1c0}]) [ 3241.457310] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3241.482822] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3241.490745] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3241.528967] loop3: p3 start 225 is beyond EOD, truncated [ 3241.535267] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3241.573879] loop5: p2 p3 p4 [ 3241.601141] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3241.619188] ldm_validate_privheads(): Disk read failed. [ 3241.642668] loop3: p2 p3 p4 [ 3241.645822] loop3: partition table partially beyond EOD, truncated [ 3241.652628] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3241.658804] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3241.662443] loop3: p3 start 225 is beyond EOD, truncated [ 3241.671326] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3241.722342] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:22 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00004e02008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x290, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:22 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000005000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff90020000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10700008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000003ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3241.866375] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3241.876664] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3241.882930] loop5: p2 p3 p4 [ 3241.886837] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3241.894633] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3241.903007] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:22 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000007000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffac020000008000da55aa", 0x40, 0x1c0}]) [ 3242.043716] ldm_validate_privheads(): Disk read failed. [ 3242.056827] loop3: p2 p3 p4 [ 3242.077361] loop2: p2 < > p3 p4 [ 3242.081042] loop2: partition table partially beyond EOD, truncated [ 3242.082858] loop3: partition table partially beyond EOD, truncated 03:04:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x294, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3242.115161] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3242.122942] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3242.131540] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3242.146729] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3242.168403] loop3: p3 start 225 is beyond EOD, truncated 03:04:22 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000008100000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffc0020000008000da55aa", 0x40, 0x1c0}]) [ 3242.202832] loop2: p4 start 38666240 is beyond EOD, truncated [ 3242.222774] loop5: p2 p3 p4 [ 3242.238752] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:22 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00007802008000da55aa", 0x40, 0x1c0}]) [ 3242.262152] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:22 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000008800000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:22 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd4020000008000da55aa", 0x40, 0x1c0}]) [ 3242.308239] ldm_validate_privheads(): Disk read failed. [ 3242.314231] loop3: p2 p3 p4 [ 3242.337376] loop3: partition table partially beyond EOD, truncated [ 3242.340585] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x298, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3242.373065] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3242.416629] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3242.424412] loop3: p3 start 225 is beyond EOD, truncated [ 3242.447310] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3242.453907] loop2: p2 < > p3 p4 [ 3242.459093] loop2: partition table partially beyond EOD, truncated 03:04:22 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffdc020000008000da55aa", 0x40, 0x1c0}]) [ 3242.498701] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3242.588319] loop2: p4 start 41418752 is beyond EOD, truncated [ 3242.619072] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3242.658286] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3242.664693] loop5: p2 p3 p4 [ 3242.668350] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3242.677288] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3242.685895] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:23 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10003008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x100001ffff000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a001903ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2b0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:23 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe6020000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008002008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff6020000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000020000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2b4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3242.958104] loop2: p2 < > p3 p4 [ 3242.961598] loop2: partition table partially beyond EOD, truncated [ 3242.980592] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3243.004622] loop2: p4 start 41943040 is beyond EOD, truncated 03:04:23 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00030000008000da55aa", 0x40, 0x1c0}]) [ 3243.032861] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3243.055529] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:23 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000021000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3243.078319] ldm_validate_privheads(): Disk read failed. [ 3243.098819] loop3: p2 p3 p4 [ 3243.110200] loop3: partition table partially beyond EOD, truncated 03:04:23 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008502008000da55aa", 0x40, 0x1c0}]) [ 3243.137376] loop5: p2 p3 p4 [ 3243.160768] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3243.168081] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3243.287389] loop2: p2 < > p3 p4 [ 3243.290928] loop2: partition table partially beyond EOD, truncated [ 3243.292087] loop3: p3 start 225 is beyond EOD, truncated [ 3243.317561] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3243.322688] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3243.330213] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3243.383111] loop2: p4 start 42270720 is beyond EOD, truncated [ 3243.437478] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3243.538120] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3243.569159] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3243.575548] loop5: p2 p3 p4 [ 3243.579854] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:23 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10005008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2c0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:23 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff08030000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000effdffff, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008a02008000da55aa", 0x40, 0x1c0}]) 03:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000005ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3243.588665] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3243.597889] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff19030000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000f6ffffff, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2cc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff40030000008000da55aa", 0x40, 0x1c0}]) [ 3243.781650] ldm_validate_privheads(): Disk read failed. [ 3243.788669] loop3: p2 p3 p4 [ 3243.792516] loop3: partition table partially beyond EOD, truncated [ 3243.820949] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:24 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000fcfdffff, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3243.851397] loop2: p2 < > p3 p4 [ 3243.856269] loop2: partition table partially beyond EOD, truncated [ 3243.874120] loop3: p3 start 225 is beyond EOD, truncated [ 3243.902351] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3243.920690] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3243.930145] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3243.930707] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff4c030000008000da55aa", 0x40, 0x1c0}]) [ 3243.951107] loop5: p2 p3 p4 [ 3243.965831] loop2: p4 start 42598400 is beyond EOD, truncated [ 3243.971505] loop5: partition table partially beyond EOD, truncated [ 3243.990829] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3244.037347] loop2: p2 < > p3 p4 [ 3244.040835] loop2: partition table partially beyond EOD, truncated [ 3244.068211] loop5: p3 start 327905 is beyond EOD, truncated [ 3244.081104] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3244.086518] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3244.109288] loop2: p4 start 42598400 is beyond EOD, truncated 03:04:24 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10007008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000feffffff, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2e0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff64030000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008e02008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000006ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff68030000008000da55aa", 0x40, 0x1c0}]) [ 3244.487124] ldm_validate_privheads(): Disk read failed. [ 3244.499619] loop3: p2 p3 p4 [ 3244.513216] loop3: partition table partially beyond EOD, truncated [ 3244.529194] loop2: p2 < > p3 p4 03:04:24 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000fffffdef, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2e4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3244.532734] loop2: partition table partially beyond EOD, truncated [ 3244.547705] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3244.576641] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:24 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff70030000008000da55aa", 0x40, 0x1c0}]) [ 3244.585282] loop3: p3 start 225 is beyond EOD, truncated [ 3244.599389] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3244.607483] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3244.622517] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:25 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000fffffdfc, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3244.681773] loop2: p4 start 42860544 is beyond EOD, truncated [ 3244.701208] loop5: p2 p3 p4 [ 3244.716018] loop5: partition table partially beyond EOD, truncated 03:04:25 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff78030000008000da55aa", 0x40, 0x1c0}]) [ 3244.747415] loop2: p2 < > p3 p4 [ 3244.753895] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3244.771470] loop2: partition table partially beyond EOD, truncated [ 3244.796583] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3244.811219] loop2: p4 start 42860544 is beyond EOD, truncated [ 3244.890198] loop5: p3 start 458977 is beyond EOD, truncated [ 3244.933145] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3245.063778] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3245.091886] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3245.099419] loop5: p2 p3 p4 [ 3245.102506] loop5: partition table partially beyond EOD, truncated 03:04:25 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e1fdef008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2ea, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:25 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff8a030000008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00009802008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000007ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000fffffff6, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3245.110375] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3245.118726] loop5: p3 start 458977 is beyond EOD, truncated [ 3245.124502] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:25 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa0030000008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2ee, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:25 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x10000fffffffe, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3245.297368] loop2: p2 < > p3 p4 [ 3245.301252] loop2: partition table partially beyond EOD, truncated [ 3245.316578] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3245.333380] loop2: p4 start 43515904 is beyond EOD, truncated 03:04:25 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa4030000008000da55aa", 0x40, 0x1c0}]) 03:04:25 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x400000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3245.373613] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:25 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000a402008000da55aa", 0x40, 0x1c0}]) [ 3245.426788] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3245.431106] ldm_validate_privheads(): Disk read failed. [ 3245.457288] loop5: p2 p3 p4 [ 3245.463706] loop3: p2 p3 p4 [ 3245.473839] loop5: partition table partially beyond EOD, truncated [ 3245.478859] loop3: partition table partially beyond EOD, truncated [ 3245.511519] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3245.530463] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3245.614053] loop5: p3 start 15728097 is beyond EOD, truncated [ 3245.620191] loop3: p3 start 225 is beyond EOD, truncated [ 3245.620260] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3245.625837] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3245.708051] loop2: p2 < > p3 p4 [ 3245.711659] loop2: partition table partially beyond EOD, truncated [ 3245.735075] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3245.740660] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3245.752157] loop2: p4 start 44302336 is beyond EOD, truncated 03:04:26 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e1effd008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffae030000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2f0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:26 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x500000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3245.769532] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3245.775549] loop5: p2 p3 p4 [ 3245.778847] loop5: partition table partially beyond EOD, truncated [ 3245.785521] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3245.793489] loop5: p3 start 15728097 is beyond EOD, truncated [ 3245.799812] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000009ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000ee02008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2f2, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:26 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x800000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffc2030000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x5, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3246.048481] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3246.092605] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3246.118251] loop5: p2 p3 p4 [ 3246.128014] loop2: p2 < > p3 p4 [ 3246.131556] loop2: partition table partially beyond EOD, truncated [ 3246.141054] loop5: partition table partially beyond EOD, truncated 03:04:26 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd0030000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2fc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3246.166096] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3246.181123] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3246.190282] ldm_validate_privheads(): Disk read failed. [ 3246.198589] loop2: p4 start 49152000 is beyond EOD, truncated [ 3246.209497] loop3: p2 p3 p4 [ 3246.231824] loop5: p3 start 16642017 is beyond EOD, truncated [ 3246.240860] loop3: partition table partially beyond EOD, truncated [ 3246.265321] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3246.280870] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3246.320508] loop3: p3 start 225 is beyond EOD, truncated [ 3246.334591] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3246.405903] ldm_validate_privheads(): Disk read failed. [ 3246.418239] loop3: p2 p3 p4 [ 3246.421637] loop3: partition table partially beyond EOD, truncated [ 3246.429115] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3246.438376] loop3: p3 start 225 is beyond EOD, truncated [ 3246.444206] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3246.538294] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3246.556696] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3246.562687] loop5: p2 p3 p4 [ 3246.565710] loop5: partition table partially beyond EOD, truncated [ 3246.576801] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:26 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10002008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0xe, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f402008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd2030000008000da55aa", 0x40, 0x1c0}]) 03:04:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x300, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000319ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3246.584868] loop5: p3 start 16642017 is beyond EOD, truncated [ 3246.592288] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:27 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0401a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x306, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:27 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd4030000008000da55aa", 0x40, 0x1c0}]) [ 3246.758875] loop2: p2 < > p3 p4 [ 3246.762470] loop2: partition table partially beyond EOD, truncated 03:04:27 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0e01a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffd6030000008000da55aa", 0x40, 0x1c0}]) [ 3246.802539] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3246.811191] ldm_validate_privheads(): Disk read failed. [ 3246.821598] loop3: p2 p3 p4 [ 3246.826916] loop3: partition table partially beyond EOD, truncated [ 3246.840788] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3246.850895] loop2: p4 start 49545216 is beyond EOD, truncated [ 3246.858490] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x308, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3246.917702] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3246.931758] loop3: p3 start 225 is beyond EOD, truncated [ 3246.959003] loop5: p2 p3 p4 [ 3246.963397] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3246.989155] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3247.026895] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3247.062420] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3247.167990] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3247.179883] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3247.192388] loop5: p2 p3 p4 [ 3247.198530] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3247.234680] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3247.280384] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:27 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10003008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffdc030000008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0202a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x310, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00001fff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x320, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:28 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe0030000008000da55aa", 0x40, 0x1c0}]) [ 3247.627045] loop2: p2 < > p3 p4 [ 3247.631651] loop2: partition table partially beyond EOD, truncated [ 3247.665341] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:28 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0203a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3247.715621] loop2: p4 start 50331648 is beyond EOD, truncated 03:04:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x324, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:28 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffe4030000008000da55aa", 0x40, 0x1c0}]) [ 3247.790645] ldm_validate_privheads(): Disk read failed. [ 3247.799259] loop3: p2 p3 p4 [ 3247.826608] loop3: partition table partially beyond EOD, truncated 03:04:28 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0204a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3247.851207] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3247.898389] loop3: p3 start 225 is beyond EOD, truncated [ 3247.929658] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3247.940239] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3247.947550] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3247.975210] loop5: p2 p3 p4 [ 3248.020120] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3248.101136] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3248.193229] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3248.247376] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3248.257334] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3248.263638] loop5: p2 p3 p4 [ 3248.267013] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3248.274855] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3248.282803] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:28 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10004008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001903008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0205a5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff0030000008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x338, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000020ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:28 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff2030000008000da55aa", 0x40, 0x1c0}]) [ 3248.458656] loop2: p2 < > p3 p4 [ 3248.462205] loop2: partition table partially beyond EOD, truncated 03:04:28 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="020ea5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3248.500114] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3248.522441] loop2: p4 start 51970048 is beyond EOD, truncated 03:04:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x34e, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:28 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff4030000008000da55aa", 0x40, 0x1c0}]) [ 3248.552938] ldm_validate_privheads(): Disk read failed. [ 3248.563788] loop3: p2 p3 p4 [ 3248.574247] loop3: partition table partially beyond EOD, truncated [ 3248.594283] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3248.610530] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3248.620270] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:29 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="020fa5ffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3248.671987] loop3: p3 start 225 is beyond EOD, truncated [ 3248.678726] loop5: p2 p3 p4 [ 3248.693104] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:29 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001a03008000da55aa", 0x40, 0x1c0}]) [ 3248.720619] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3248.738818] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3248.770622] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3248.818961] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3248.868415] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3248.875027] loop5: p2 p3 p4 [ 3248.882597] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3248.891173] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3248.899793] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:29 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10005008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff6030000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0e000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x354, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3248.966696] loop2: p2 < > p3 p4 [ 3248.970774] loop2: partition table partially beyond EOD, truncated [ 3248.991616] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3249.008518] loop2: p4 start 52035584 is beyond EOD, truncated 03:04:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000023ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5fffffffa000000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff8030000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00002c03008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x358, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:29 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00050000008000da55aa", 0x40, 0x1c0}]) 03:04:29 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffffe00f0000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3249.222720] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3249.247175] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3249.253811] loop5: p2 p3 p4 [ 3249.281127] loop5: partition table partially beyond EOD, truncated [ 3249.306205] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x368, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3249.330827] ldm_validate_privheads(): Disk read failed. [ 3249.338226] loop2: p2 < > p3 p4 [ 3249.341619] loop2: partition table partially beyond EOD, truncated [ 3249.362533] loop3: p2 p3 p4 [ 3249.383908] loop3: partition table partially beyond EOD, truncated [ 3249.389713] loop5: p3 start 327905 is beyond EOD, truncated [ 3249.399395] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3249.412983] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3249.416064] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3249.428852] loop2: p4 start 53215232 is beyond EOD, truncated [ 3249.495913] loop3: p3 start 225 is beyond EOD, truncated [ 3249.504314] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3249.533751] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3249.558393] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3249.632130] loop5: p2 p3 p4 [ 3249.638827] loop5: partition table partially beyond EOD, truncated [ 3249.694057] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3249.715105] loop5: p3 start 327905 is beyond EOD, truncated [ 3249.722908] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:30 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10007008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00060000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a020000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x378, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:30 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00003003008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000048ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00070000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a030000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3249.971477] ldm_validate_privheads(): Disk read failed. [ 3249.988284] loop3: p2 p3 p4 [ 3250.003983] loop3: partition table partially beyond EOD, truncated 03:04:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x380, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3250.038649] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3250.067522] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3250.078523] loop2: p2 < > p3 p4 [ 3250.082225] loop2: partition table partially beyond EOD, truncated [ 3250.090649] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3250.116158] loop5: p2 p3 p4 [ 3250.127891] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3250.134533] loop3: p3 start 225 is beyond EOD, truncated 03:04:30 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a040000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03080000008000da55aa", 0x40, 0x1c0}]) [ 3250.141784] loop5: partition table partially beyond EOD, truncated [ 3250.149913] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3250.168593] loop2: p4 start 53477376 is beyond EOD, truncated [ 3250.179546] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x386, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3250.306593] loop5: p3 start 458977 is beyond EOD, truncated [ 3250.338067] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3250.450419] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3250.472677] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3250.487420] loop5: p2 p3 p4 03:04:30 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00090000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00003203008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a050000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00004cff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000038877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x388, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3250.496191] loop5: partition table partially beyond EOD, truncated [ 3250.505072] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3250.513678] loop5: p3 start 458977 is beyond EOD, truncated [ 3250.521045] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:31 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a070000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000a0000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x38a, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:31 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000300ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff010c0000008000da55aa", 0x40, 0x1c0}]) [ 3250.699844] loop2: p2 < > p3 p4 [ 3250.703390] loop2: partition table partially beyond EOD, truncated [ 3250.736123] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:31 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02100000008000da55aa", 0x40, 0x1c0}]) [ 3250.764772] loop2: p4 start 53608448 is beyond EOD, truncated [ 3250.779069] ldm_validate_privheads(): Disk read failed. [ 3250.785202] loop3: p2 p3 p4 [ 3250.803435] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3250.829929] loop3: partition table partially beyond EOD, truncated [ 3250.840077] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3250.850063] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3250.868004] loop5: p2 p3 p4 [ 3250.871215] loop5: partition table partially beyond EOD, truncated [ 3250.939092] loop3: p3 start 225 is beyond EOD, truncated [ 3250.944674] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:31 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000500ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00003e03008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3a0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3251.062036] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3251.153208] loop5: p3 start 50331873 is beyond EOD, truncated [ 3251.170602] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3251.239822] loop2: p2 < > p3 p4 [ 3251.243515] loop2: partition table partially beyond EOD, truncated [ 3251.251121] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3251.266135] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3251.277385] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3251.278780] loop5: p2 p3 p4 03:04:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000060ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3251.287707] loop5: partition table partially beyond EOD, truncated [ 3251.302327] loop2: p4 start 54394880 is beyond EOD, truncated [ 3251.316409] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:31 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000058877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00120000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000700ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3a8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3251.338222] loop5: p3 start 50331873 is beyond EOD, truncated [ 3251.344242] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:31 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00004203008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03190000008000da55aa", 0x40, 0x1c0}]) [ 3251.471341] ldm_validate_privheads(): Disk read failed. [ 3251.497473] loop3: p2 p3 p4 [ 3251.528992] loop3: partition table partially beyond EOD, truncated [ 3251.556570] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:31 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a002000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3bc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3251.576423] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3251.607668] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3251.615368] loop5: p2 p3 p4 [ 3251.620044] loop5: partition table partially beyond EOD, truncated 03:04:32 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff001c0000008000da55aa", 0x40, 0x1c0}]) [ 3251.623162] loop3: p3 start 225 is beyond EOD, truncated [ 3251.647494] loop2: p2 < > p3 p4 [ 3251.655394] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3251.659588] loop2: partition table partially beyond EOD, truncated 03:04:32 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0afdef00ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3251.683015] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3251.708989] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:32 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff021c0000008000da55aa", 0x40, 0x1c0}]) [ 3251.800504] loop5: p3 start 83886305 is beyond EOD, truncated [ 3251.812074] loop2: p4 start 54657024 is beyond EOD, truncated [ 3251.850278] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000068ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3252.097756] ldm_validate_privheads(): Disk read failed. [ 3252.104821] loop3: p2 p3 p4 [ 3252.116464] loop3: partition table partially beyond EOD, truncated [ 3252.151193] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3252.175736] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3252.201740] loop3: p3 start 225 is beyond EOD, truncated [ 3252.214780] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3252.223438] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3252.238480] loop5: p2 p3 p4 [ 3252.243347] loop5: partition table partially beyond EOD, truncated 03:04:32 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000078877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0aeffd00ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3c0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:32 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00006403008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff001f0000008000da55aa", 0x40, 0x1c0}]) [ 3252.266234] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3252.285318] loop5: p3 start 83886305 is beyond EOD, truncated [ 3252.299324] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00006cff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00200000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000200ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3c8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3252.508671] loop2: p2 < > p3 p4 [ 3252.526589] loop2: partition table partially beyond EOD, truncated 03:04:32 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02220000008000da55aa", 0x40, 0x1c0}]) 03:04:32 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000300ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3252.577279] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3252.599453] loop2: p4 start 56885248 is beyond EOD, truncated [ 3252.621583] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3252.642130] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3252.651775] ldm_validate_privheads(): Disk read failed. [ 3252.662773] loop3: p2 p3 p4 [ 3252.663117] loop5: p2 p3 p4 03:04:33 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008c03008000da55aa", 0x40, 0x1c0}]) [ 3252.676896] loop3: partition table partially beyond EOD, truncated [ 3252.688217] loop5: partition table partially beyond EOD, truncated [ 3252.726487] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3252.738499] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3252.771650] loop5: p3 start 117440737 is beyond EOD, truncated [ 3252.783712] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3252.791651] loop3: p3 start 225 is beyond EOD, truncated [ 3252.798523] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3252.811506] loop2: p2 < > p3 p4 [ 3252.907819] loop2: partition table partially beyond EOD, truncated [ 3253.033454] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3253.062057] loop2: p4 start 59506688 is beyond EOD, truncated [ 3253.067059] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3253.078135] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3253.085350] loop5: p2 p3 p4 [ 3253.088691] loop5: partition table partially beyond EOD, truncated [ 3253.113222] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3253.247056] loop5: p3 start 117440737 is beyond EOD, truncated [ 3253.253937] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:33 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e100fdef8877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3cc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:33 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00230000008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000400ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000074ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000d303008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000500ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:33 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01260000008000da55aa", 0x40, 0x1c0}]) [ 3253.458274] loop2: p2 < > p3 p4 [ 3253.461775] loop2: partition table partially beyond EOD, truncated 03:04:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3dc, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3253.501388] ldm_validate_privheads(): Disk read failed. [ 3253.510377] loop3: p2 p3 p4 [ 3253.515170] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3253.525526] loop3: partition table partially beyond EOD, truncated [ 3253.540764] loop2: p4 start 64159744 is beyond EOD, truncated [ 3253.552424] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3253.568221] loop2: p2 < > p3 p4 [ 3253.571695] loop2: partition table partially beyond EOD, truncated [ 3253.572018] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3253.591007] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3253.598000] loop5: p2 p3 p4 [ 3253.601337] loop5: partition table partially beyond EOD, truncated [ 3253.613344] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:34 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000700ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3253.644678] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3253.657471] loop3: p3 start 225 is beyond EOD, truncated [ 3253.682522] loop5: p3 start 4026335457 is beyond EOD, truncated 03:04:34 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02280000008000da55aa", 0x40, 0x1c0}]) [ 3253.689143] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3253.689917] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3253.714834] loop2: p4 start 64159744 is beyond EOD, truncated 03:04:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3e0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3254.006418] ldm_validate_privheads(): Disk read failed. [ 3254.011946] loop3: p2 p3 p4 [ 3254.014969] loop3: partition table partially beyond EOD, truncated [ 3254.037040] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3254.059899] loop3: p3 start 225 is beyond EOD, truncated [ 3254.065383] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:34 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e100effd8877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01300000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000003ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f003008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3e8, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00007aff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02300000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000005ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3ec, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:34 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff003f0000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02400000008000da55aa", 0x40, 0x1c0}]) 03:04:34 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000007ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3254.422798] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3254.440186] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3254.448611] loop5: p2 p3 p4 [ 3254.451991] loop5: partition table partially beyond EOD, truncated [ 3254.453838] ldm_validate_privheads(): Disk read failed. [ 3254.469170] loop3: p2 p3 p4 [ 3254.481917] loop3: partition table partially beyond EOD, truncated [ 3254.499109] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3254.509071] loop2: p2 < > p3 p4 [ 3254.512558] loop2: partition table partially beyond EOD, truncated [ 3254.529342] loop5: p3 start 4260298977 is beyond EOD, truncated [ 3254.535802] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3254.550789] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3254.598374] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3254.614015] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3254.662534] loop2: p4 start 66060288 is beyond EOD, truncated [ 3254.669245] loop3: p3 start 225 is beyond EOD, truncated [ 3254.681759] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3254.685429] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3254.697069] loop5: p2 p3 p4 [ 3254.700121] loop5: partition table partially beyond EOD, truncated [ 3254.717556] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3254.725386] loop5: p3 start 4260298977 is beyond EOD, truncated [ 3254.731860] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:35 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000028877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3f0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:35 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03400000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f203008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000020ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000fffff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3f2, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:35 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00480000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff004c0000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00fdefff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3f4, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3255.088858] loop2: p2 < > p3 p4 [ 3255.092435] loop2: partition table partially beyond EOD, truncated [ 3255.117473] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3255.118407] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:35 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00effdff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3255.134470] loop2: p4 start 66191360 is beyond EOD, truncated [ 3255.150855] ldm_validate_privheads(): Disk read failed. [ 3255.157290] loop3: p2 p3 p4 [ 3255.162097] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3255.168597] loop2: p2 < > p3 p4 [ 3255.168609] loop2: partition table partially beyond EOD, truncated [ 3255.170691] loop3: partition table partially beyond EOD, truncated [ 3255.179033] loop5: p2 p3 p4 [ 3255.179180] loop5: partition table partially beyond EOD, truncated [ 3255.190167] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3255.215850] loop5: p3 start 33554657 is beyond EOD, truncated [ 3255.217095] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3255.229276] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3255.265339] loop2: p4 start 66191360 is beyond EOD, truncated [ 3255.342985] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3255.386835] loop3: p3 start 225 is beyond EOD, truncated [ 3255.407432] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3255.429856] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3255.467300] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3255.484545] loop5: p2 p3 p4 [ 3255.488606] loop5: partition table partially beyond EOD, truncated [ 3255.495438] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3255.505159] loop5: p3 start 33554657 is beyond EOD, truncated 03:04:35 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000038877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff034c0000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f403008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000002ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3f6, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3255.512710] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a0000007645ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000003ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00540000008000da55aa", 0x40, 0x1c0}]) [ 3255.709538] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3255.732760] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3255.748311] loop2: p2 < > p3 p4 [ 3255.751761] loop2: partition table partially beyond EOD, truncated 03:04:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x500, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3255.765774] loop5: p2 p3 p4 [ 3255.778142] loop5: partition table partially beyond EOD, truncated [ 3255.785649] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3255.805595] ldm_validate_privheads(): Disk read failed. 03:04:36 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000004ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3255.806957] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3255.822337] loop3: p2 p3 p4 [ 3255.822620] loop2: p4 start 66322432 is beyond EOD, truncated [ 3255.846269] loop3: partition table partially beyond EOD, truncated [ 3255.855474] loop2: p2 < > p3 p4 [ 3255.859335] loop2: partition table partially beyond EOD, truncated [ 3255.885343] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:36 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01580000008000da55aa", 0x40, 0x1c0}]) [ 3255.888877] loop5: p3 start 50331873 is beyond EOD, truncated [ 3255.920245] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3255.930459] loop2: p4 start 66322432 is beyond EOD, truncated [ 3255.948557] loop3: p3 start 225 is beyond EOD, truncated 03:04:36 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f603008000da55aa", 0x40, 0x1c0}]) [ 3255.977062] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3256.075258] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3256.168639] loop2: p2 < > p3 p4 [ 3256.172104] loop2: partition table partially beyond EOD, truncated [ 3256.214161] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3256.223236] loop2: p4 start 66453504 is beyond EOD, truncated [ 3256.266807] loop2: p2 < > p3 p4 [ 3256.275645] loop2: partition table partially beyond EOD, truncated [ 3256.294666] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3256.317620] loop2: p4 start 66453504 is beyond EOD, truncated 03:04:36 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000048877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x600, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:36 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000005ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02580000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000001fc45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000f803008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff005a0000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000007ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x603, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:37 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff005c0000008000da55aa", 0x40, 0x1c0}]) [ 3256.628740] loop2: p2 < > p3 p4 [ 3256.632358] loop2: partition table partially beyond EOD, truncated [ 3256.657865] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:37 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac020000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3256.678532] loop2: p4 start 66584576 is beyond EOD, truncated 03:04:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x700, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3256.728257] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3256.748180] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3256.762621] ldm_validate_privheads(): Disk read failed. [ 3256.764737] loop5: p2 p3 p4 [ 3256.771290] loop3: p2 p3 p4 [ 3256.781673] loop5: partition table partially beyond EOD, truncated [ 3256.789675] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3256.791905] loop3: partition table partially beyond EOD, truncated [ 3256.803894] loop5: p3 start 67109089 is beyond EOD, truncated [ 3256.811503] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3256.850703] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3256.866155] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3256.879401] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3256.886747] loop5: p2 p3 p4 [ 3256.890631] loop3: p3 start 225 is beyond EOD, truncated [ 3256.892570] loop5: partition table partially beyond EOD, truncated [ 3256.910818] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3256.914509] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3256.982192] loop5: p3 start 67109089 is beyond EOD, truncated [ 3256.992550] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:37 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000058877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff005e0000008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac030000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000fa03008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000002ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00600000008000da55aa", 0x40, 0x1c0}]) 03:04:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x900, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:37 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac040000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3257.355549] ldm_validate_privheads(): Disk read failed. [ 3257.364366] loop3: p2 p3 p4 [ 3257.397387] loop3: partition table partially beyond EOD, truncated [ 3257.431412] loop2: p2 < > p3 p4 [ 3257.439340] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:37 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff88600000008000da55aa", 0x40, 0x1c0}]) [ 3257.439529] loop2: partition table partially beyond EOD, truncated [ 3257.477081] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3257.500201] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3257.510285] loop3: p3 start 225 is beyond EOD, truncated [ 3257.526873] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3257.529933] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3257.544251] loop5: p2 p3 p4 03:04:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:37 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac050000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3257.567876] loop5: partition table partially beyond EOD, truncated [ 3257.622366] loop2: p4 start 66715648 is beyond EOD, truncated [ 3257.629298] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3257.756724] loop5: p3 start 83886305 is beyond EOD, truncated [ 3257.766940] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000078877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01640000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000fc03008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:38 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac070000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000003ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac210000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03640000008000da55aa", 0x40, 0x1c0}]) 03:04:38 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00680000008000da55aa", 0x40, 0x1c0}]) [ 3258.131054] loop2: p2 < > p3 p4 [ 3258.134640] loop2: partition table partially beyond EOD, truncated 03:04:38 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000300000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3258.224167] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3258.238240] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3258.259371] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc02, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:38 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000500000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3258.277998] ldm_validate_privheads(): Disk read failed. [ 3258.278317] loop3: p2 p3 p4 [ 3258.291481] loop3: partition table partially beyond EOD, truncated [ 3258.299318] loop2: p4 start 66846720 is beyond EOD, truncated [ 3258.314056] loop5: p2 p3 p4 [ 3258.320710] loop5: partition table partially beyond EOD, truncated [ 3258.330488] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3258.385560] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3258.415311] loop3: p3 start 225 is beyond EOD, truncated [ 3258.440771] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3258.508632] loop5: p3 start 117440737 is beyond EOD, truncated [ 3258.514780] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3258.549701] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3258.565989] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3258.577292] loop5: p2 p3 p4 [ 3258.580366] loop5: partition table partially beyond EOD, truncated [ 3258.587404] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:39 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877027200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01680000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000fe03008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000700000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xe00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3258.595012] loop5: p3 start 117440737 is beyond EOD, truncated [ 3258.601419] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000004ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac081000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03680000008000da55aa", 0x40, 0x1c0}]) [ 3258.719639] loop2: p2 < > p3 p4 [ 3258.723188] loop2: partition table partially beyond EOD, truncated 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac002000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xf00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff006c0000008000da55aa", 0x40, 0x1c0}]) [ 3258.816351] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3258.843783] loop2: p4 start 66977792 is beyond EOD, truncated [ 3258.864034] loop2: p2 < > p3 p4 [ 3258.867983] loop2: partition table partially beyond EOD, truncated [ 3258.871061] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3258.901781] ldm_validate_privheads(): Disk read failed. [ 3258.903844] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac088000000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3258.914789] loop3: p2 p3 p4 [ 3258.925675] loop3: partition table partially beyond EOD, truncated [ 3258.934298] loop2: p4 start 66977792 is beyond EOD, truncated [ 3258.937061] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3258.960358] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3258.965314] loop5: p2 p3 p4 [ 3258.980543] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3259.038595] loop3: p3 start 225 is beyond EOD, truncated [ 3259.062761] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3259.082173] loop5: p3 size 1912764296 extends beyond EOD, truncated [ 3259.147715] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3259.246917] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3259.268063] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3259.287793] loop5: p2 p3 p4 03:04:39 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877037200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03700000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1003, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:39 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000005008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfdef00000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000005ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3259.291336] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3259.307900] loop5: p3 size 1912764296 extends beyond EOD, truncated [ 3259.328975] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00740000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45aceffd00000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3259.429472] loop2: p2 < > p3 p4 [ 3259.433045] loop2: partition table partially beyond EOD, truncated 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01740000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1200, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3259.479257] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3259.502332] ldm_validate_privheads(): Disk read failed. [ 3259.511329] loop3: p2 p3 p4 03:04:39 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000020000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:39 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01760000008000da55aa", 0x40, 0x1c0}]) [ 3259.529286] loop3: partition table partially beyond EOD, truncated [ 3259.540105] loop2: p4 start 83886080 is beyond EOD, truncated [ 3259.556419] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3259.566706] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3259.582173] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3259.596278] loop2: p2 < > p3 p4 [ 3259.604372] loop2: partition table partially beyond EOD, truncated [ 3259.620038] loop5: p2 p3 p4 [ 3259.621715] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3259.634484] loop2: p4 start 83886080 is beyond EOD, truncated [ 3259.670191] loop3: p3 start 225 is beyond EOD, truncated [ 3259.677804] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3259.706745] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3259.752687] loop5: p3 size 1912829832 extends beyond EOD, truncated [ 3259.772095] ldm_validate_privheads(): Disk read failed. [ 3259.780034] loop3: p2 p3 p4 [ 3259.792119] loop3: partition table partially beyond EOD, truncated [ 3259.793887] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3259.806627] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3259.824025] loop3: p3 start 225 is beyond EOD, truncated [ 3259.838057] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:40 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877047200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00780000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac1ffff0000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000006008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1402, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000006ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1800, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:40 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000010063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03780000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:40 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000020063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:40 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff007a0000008000da55aa", 0x40, 0x1c0}]) [ 3260.138067] ldm_validate_privheads(): Disk read failed. [ 3260.143834] loop3: p2 p3 p4 [ 3260.167513] loop3: partition table partially beyond EOD, truncated [ 3260.184322] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3260.225474] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3260.235985] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3260.238845] loop3: p3 start 225 is beyond EOD, truncated [ 3260.244916] loop5: p2 p3 p4 [ 3260.253451] loop2: p2 < > p3 p4 [ 3260.256836] loop2: partition table partially beyond EOD, truncated [ 3260.265990] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3260.269882] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3260.274075] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3260.350717] loop2: p4 start 100663296 is beyond EOD, truncated [ 3260.353000] loop5: p3 size 1912895368 extends beyond EOD, truncated [ 3260.382468] loop2: p2 < > p3 p4 [ 3260.384423] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3260.412116] loop2: partition table partially beyond EOD, truncated [ 3260.421818] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3260.429930] loop2: p4 start 100663296 is beyond EOD, truncated 03:04:41 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877057200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01820000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000030063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000206008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1a01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000007ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01840000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000040063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1c00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3260.768913] loop2: p2 < > p3 p4 [ 3260.772700] loop2: partition table partially beyond EOD, truncated [ 3260.800533] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff038a0000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000050063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3260.840477] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3260.852386] loop2: p4 start 100794368 is beyond EOD, truncated [ 3260.873491] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3260.887223] loop5: p2 p3 p4 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff008c0000008000da55aa", 0x40, 0x1c0}]) [ 3260.898555] ldm_validate_privheads(): Disk read failed. [ 3260.916692] loop3: p2 p3 p4 [ 3260.930635] loop3: partition table partially beyond EOD, truncated [ 3260.955896] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3260.989592] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3261.032776] loop3: p3 start 225 is beyond EOD, truncated [ 3261.034355] loop5: p3 size 1912960904 extends beyond EOD, truncated [ 3261.044819] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3261.088079] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3261.206384] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3261.236662] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3261.244487] loop5: p2 p3 p4 [ 3261.249132] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:41 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877077200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000007008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000070063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff018c0000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1c01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000008ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3261.258415] loop5: p3 size 1912960904 extends beyond EOD, truncated [ 3261.267305] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000010080063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02900000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1c02, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3261.379925] loop2: p2 < > p3 p4 [ 3261.389523] loop2: partition table partially beyond EOD, truncated [ 3261.406445] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3261.416208] loop2: p4 start 117440512 is beyond EOD, truncated 03:04:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000080080063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00980000008000da55aa", 0x40, 0x1c0}]) [ 3261.472887] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3261.488380] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3261.507205] loop5: p2 p3 p4 [ 3261.511638] ldm_validate_privheads(): Disk read failed. [ 3261.514608] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:41 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01980000008000da55aa", 0x40, 0x1c0}]) [ 3261.531353] loop3: p2 p3 p4 [ 3261.531436] loop3: partition table partially beyond EOD, truncated [ 3261.532950] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3261.590325] loop3: p3 start 225 is beyond EOD, truncated [ 3261.595917] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3261.605606] loop5: p3 size 1913091976 extends beyond EOD, truncated [ 3261.684433] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3261.827859] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3261.855113] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3261.863005] loop5: p2 p3 p4 [ 3261.866277] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:42 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007202300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000009008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00f0ff1f0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03a00000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1e00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000009ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3261.879026] loop5: p3 size 1913091976 extends beyond EOD, truncated [ 3261.886727] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01a40000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000200063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x1f00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3262.010592] loop2: p2 < > p3 p4 [ 3262.016593] loop2: partition table partially beyond EOD, truncated [ 3262.041915] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3262.053572] ldm_validate_privheads(): Disk read failed. 03:04:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000210063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3262.069856] loop2: p4 start 150994944 is beyond EOD, truncated [ 3262.072999] loop3: p2 p3 p4 [ 3262.109551] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03a40000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000000e008000da55aa", 0x40, 0x1c0}]) [ 3262.110232] loop3: partition table partially beyond EOD, truncated [ 3262.134022] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3262.154596] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3262.202914] loop5: unable to read partition table [ 3262.215786] loop3: p3 start 225 is beyond EOD, truncated [ 3262.226493] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3262.275653] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3262.329292] loop2: p2 < > p3 p4 [ 3262.332836] loop2: partition table partially beyond EOD, truncated [ 3262.356103] print_req_error: I/O error, dev loop5, sector 0 [ 3262.362271] Buffer I/O error on dev loop5, logical block 0, async page read [ 3262.379089] ldm_validate_partition_table(): Disk read failed. [ 3262.379389] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3262.389748] Dev loop5: unable to read RDB block 0 [ 3262.400700] loop5: unable to read partition table [ 3262.406893] loop5: partition table beyond EOD, truncated [ 3262.415772] loop2: p4 start 234881024 is beyond EOD, truncated 03:04:42 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007203300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfffffdef0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2000, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00a80000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000010ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000319008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfffffff60063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00aa0000008000da55aa", 0x40, 0x1c0}]) 03:04:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02ac0000008000da55aa", 0x40, 0x1c0}]) [ 3262.598073] ldm_validate_privheads(): Disk read failed. [ 3262.604072] loop3: p2 p3 p4 [ 3262.607289] loop3: partition table partially beyond EOD, truncated [ 3262.637374] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3262.649746] loop2: p2 < > p3 p4 [ 3262.653781] loop2: partition table partially beyond EOD, truncated [ 3262.676008] loop3: p3 start 225 is beyond EOD, truncated [ 3262.686118] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfffffdfc0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3262.701704] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3262.703303] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfffffffe0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3262.750867] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3262.820779] loop2: p4 start 419627008 is beyond EOD, truncated [ 3262.870023] loop5: unable to read partition table [ 3262.876184] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3262.888133] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3262.920579] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3262.956807] loop5: unable to read partition table 03:04:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2003, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03ae0000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000031a008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007204300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45aceffdffff0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000023ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00b00000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2200, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfcfdffff0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3263.169518] loop2: p2 < > p3 p4 [ 3263.172988] loop2: partition table partially beyond EOD, truncated 03:04:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00b80000008000da55aa", 0x40, 0x1c0}]) [ 3263.213435] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3263.232922] loop2: p4 start 436404224 is beyond EOD, truncated [ 3263.251869] ldm_validate_privheads(): Disk read failed. [ 3263.261264] loop3: p2 p3 p4 [ 3263.270277] loop3: partition table partially beyond EOD, truncated [ 3263.290560] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3263.300991] loop2: p2 < > p3 p4 [ 3263.302997] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acf6ffffff0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3263.304748] loop2: partition table partially beyond EOD, truncated 03:04:43 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01ba0000008000da55aa", 0x40, 0x1c0}]) 03:04:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2400, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3263.336473] loop3: p3 start 225 is beyond EOD, truncated [ 3263.350387] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3263.355535] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45acfeffffff0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3263.413704] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3263.445597] loop5: unable to read partition table [ 3263.471216] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3263.486289] loop2: p4 start 436404224 is beyond EOD, truncated 03:04:43 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000001c008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2403, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00bc0000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000048ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007205300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000200000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3263.618997] loop2: p2 < > p3 p4 [ 3263.627747] loop2: partition table partially beyond EOD, truncated [ 3263.634860] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3263.656538] loop2: p4 start 469762048 is beyond EOD, truncated 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000300000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01bc0000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000021e008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2801, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000400000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02c00000008000da55aa", 0x40, 0x1c0}]) [ 3263.822329] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3263.847159] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3263.852810] ldm_validate_privheads(): Disk read failed. [ 3263.867347] loop3: p2 p3 p4 [ 3263.886515] loop3: partition table partially beyond EOD, truncated [ 3263.912212] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3263.913588] loop5: unable to read partition table 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000500000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03c20000008000da55aa", 0x40, 0x1c0}]) [ 3263.956236] loop3: p3 start 225 is beyond EOD, truncated [ 3263.986979] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3263.990823] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3264.040119] loop2: p2 < > p3 p4 [ 3264.043610] loop2: partition table partially beyond EOD, truncated [ 3264.107737] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3264.162587] loop2: p4 start 503447552 is beyond EOD, truncated 03:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00004cff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007207300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000700000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00c40000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000001f008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x28d1, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01c80000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac002100000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3264.520446] ldm_validate_privheads(): Disk read failed. [ 3264.534382] loop3: p2 p3 p4 [ 3264.541550] loop3: partition table partially beyond EOD, truncated [ 3264.557260] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3264.566774] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:44 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00ca0000008000da55aa", 0x40, 0x1c0}]) 03:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2c01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3264.592199] loop3: p3 start 225 is beyond EOD, truncated [ 3264.627320] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3264.636686] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000003000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3264.668576] loop2: p2 < > p3 p4 [ 3264.672137] loop2: partition table partially beyond EOD, truncated 03:04:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01ce0000008000da55aa", 0x40, 0x1c0}]) [ 3264.711937] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3264.719590] loop5: unable to read partition table [ 3264.752989] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 3264.763526] loop2: p4 start 520093696 is beyond EOD, truncated [ 3264.816059] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3264.848545] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3264.855530] loop5: unable to read partition table 03:04:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000060ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300a00a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000020008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000005000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2e00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00d00000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000007000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3265.022874] ldm_validate_privheads(): Disk read failed. [ 3265.033605] loop3: p2 p3 p4 [ 3265.053717] loop3: partition table partially beyond EOD, truncated 03:04:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x2e01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03d00000008000da55aa", 0x40, 0x1c0}]) [ 3265.081858] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3265.111783] loop2: p2 < > p3 p4 [ 3265.115393] loop2: partition table partially beyond EOD, truncated [ 3265.131164] loop3: p3 start 225 is beyond EOD, truncated 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000810000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3265.158985] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3265.161169] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3265.174554] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3265.194460] ldm_validate_privheads(): Disk read failed. 03:04:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03d20000008000da55aa", 0x40, 0x1c0}]) [ 3265.212637] loop3: p2 p3 p4 [ 3265.221460] loop3: partition table partially beyond EOD, truncated [ 3265.228964] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3265.243636] loop2: p4 start 536870912 is beyond EOD, truncated 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000020000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3265.274615] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3265.285531] loop5: p2 p3 p4 03:04:45 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000220008000da55aa", 0x40, 0x1c0}]) [ 3265.315880] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3265.331710] loop3: p3 start 225 is beyond EOD, truncated [ 3265.344269] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3265.431498] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3265.459386] loop2: p2 < > p3 p4 [ 3265.463031] loop2: partition table partially beyond EOD, truncated [ 3265.479389] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3265.482059] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3265.508675] loop2: p4 start 537001984 is beyond EOD, truncated [ 3265.533201] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3265.564961] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3265.572820] loop5: p2 p3 p4 03:04:45 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e1000000887700720030e000a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000068ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3000, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:45 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02d40000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000880000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:45 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000023008000da55aa", 0x40, 0x1c0}]) [ 3265.581508] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3265.589418] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3265.597086] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03d40000008000da55aa", 0x40, 0x1c0}]) 03:04:46 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fdef000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3265.730385] loop2: p2 < > p3 p4 [ 3265.739883] loop2: partition table partially beyond EOD, truncated 03:04:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03d60000008000da55aa", 0x40, 0x1c0}]) [ 3265.773060] ldm_validate_privheads(): Disk read failed. [ 3265.780592] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3265.792220] loop3: p2 p3 p4 [ 3265.803378] loop3: partition table partially beyond EOD, truncated [ 3265.814657] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:46 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00effd000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3265.818886] loop2: p4 start 587202560 is beyond EOD, truncated [ 3265.829031] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3265.846480] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3265.856955] loop3: p3 start 225 is beyond EOD, truncated [ 3265.865327] loop5: p2 p3 p4 03:04:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00d80000008000da55aa", 0x40, 0x1c0}]) [ 3265.896253] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3265.910965] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3265.966018] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3266.033677] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3266.128840] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3266.199054] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3266.208782] loop5: p2 p3 p4 [ 3266.215252] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3266.319612] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3266.410765] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:46 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e1000000887700720030e0ffa6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:46 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000200063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000124008000da55aa", 0x40, 0x1c0}]) 03:04:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3202, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:46 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01d80000008000da55aa", 0x40, 0x1c0}]) 03:04:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00006cff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac001ffff00063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02dc0000008000da55aa", 0x40, 0x1c0}]) [ 3266.689509] loop2: p2 < > p3 p4 [ 3266.693029] loop2: partition table partially beyond EOD, truncated [ 3266.726372] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3400, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:47 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000163000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3266.753925] loop2: p4 start 604045312 is beyond EOD, truncated [ 3266.777580] ldm_validate_privheads(): Disk read failed. [ 3266.785264] loop3: p2 p3 p4 [ 3266.791369] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03dc0000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000228008000da55aa", 0x40, 0x1c0}]) [ 3266.808608] loop3: partition table partially beyond EOD, truncated [ 3266.815268] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3266.824237] loop5: p2 p3 p4 [ 3266.827510] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3266.835725] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3266.903552] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3266.910479] loop3: p3 start 225 is beyond EOD, truncated [ 3266.929296] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3266.940712] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3266.979566] loop2: p2 < > p3 p4 [ 3266.983082] loop2: partition table partially beyond EOD, truncated [ 3267.018849] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3267.029668] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3267.036812] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3267.045040] loop5: p2 p3 p4 [ 3267.065598] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3267.074460] loop2: p4 start 671219712 is beyond EOD, truncated [ 3267.094864] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3267.126095] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3267.376752] ieee802154 phy0 wpan0: encryption failed: -22 [ 3267.382509] ieee802154 phy1 wpan1: encryption failed: -22 [ 3267.413769] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3267.423667] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3267.433129] loop5: p2 p3 p4 [ 3267.436652] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3267.447294] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3267.456233] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3600, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:47 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000263000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00e00000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000032c008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300702a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000074ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03e00000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000363000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3267.666159] loop2: p2 < > p3 p4 [ 3267.676352] loop2: partition table partially beyond EOD, truncated [ 3267.708678] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3267.721518] ldm_validate_privheads(): Disk read failed. [ 3267.727304] loop3: p2 p3 p4 [ 3267.733444] loop3: partition table partially beyond EOD, truncated 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03e40000008000da55aa", 0x40, 0x1c0}]) [ 3267.757504] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3267.761923] loop2: p4 start 738394112 is beyond EOD, truncated [ 3267.788538] loop3: p3 start 225 is beyond EOD, truncated [ 3267.799430] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000463000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3267.799596] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3267.830011] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff01e60000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3a01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3267.859650] loop5: p2 p3 p4 [ 3267.876828] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:48 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000330008000da55aa", 0x40, 0x1c0}]) [ 3267.923293] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3267.947234] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000563000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02e60000008000da55aa", 0x40, 0x1c0}]) [ 3268.097294] loop2: p2 < > p3 p4 [ 3268.119894] loop2: partition table partially beyond EOD, truncated [ 3268.166226] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3268.177705] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3268.193471] loop2: p4 start 805502976 is beyond EOD, truncated [ 3268.198198] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3268.235717] loop5: p2 p3 p4 [ 3268.246982] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3268.311800] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3268.361226] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:48 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300703a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000763000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a00007aff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3e00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00e80000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000332008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00f00000008000da55aa", 0x40, 0x1c0}]) 03:04:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000100863000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x3f00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3268.629373] ldm_validate_privheads(): Disk read failed. [ 3268.644978] loop3: p2 p3 p4 [ 3268.656423] loop3: partition table partially beyond EOD, truncated [ 3268.675456] loop2: p2 < > p3 p4 03:04:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03f00000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000800863000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3268.679389] loop2: partition table partially beyond EOD, truncated [ 3268.690667] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3268.701585] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3268.740166] loop2: p4 start 839057408 is beyond EOD, truncated [ 3268.756061] loop3: p3 start 225 is beyond EOD, truncated [ 3268.769533] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3268.802418] loop2: p2 < > p3 p4 03:04:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03f20000008000da55aa", 0x40, 0x1c0}]) [ 3268.835140] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3268.863763] loop2: partition table partially beyond EOD, truncated [ 3268.887793] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3268.910509] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3268.924130] loop5: p2 p3 p4 [ 3268.942217] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3268.952129] loop2: p4 start 839057408 is beyond EOD, truncated [ 3268.988228] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3269.020591] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:49 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300704a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:49 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000f0ff1f63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03f40000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a0000007645ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000023c008000da55aa", 0x40, 0x1c0}]) 03:04:49 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000002063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3269.389363] loop2: p2 < > p3 p4 [ 3269.392907] loop2: partition table partially beyond EOD, truncated [ 3269.415688] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:49 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02f60000008000da55aa", 0x40, 0x1c0}]) [ 3269.437793] loop2: p4 start 1006764032 is beyond EOD, truncated [ 3269.462549] ldm_validate_privheads(): Disk read failed. [ 3269.479076] loop3: p2 p3 p4 03:04:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4200, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000033e008000da55aa", 0x40, 0x1c0}]) [ 3269.505760] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3269.517871] loop3: partition table partially beyond EOD, truncated [ 3269.525485] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3269.559386] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3269.586078] loop5: p2 p3 p4 03:04:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03f60000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000002163000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3269.610914] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3269.637906] loop3: p3 start 225 is beyond EOD, truncated [ 3269.674191] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3269.702369] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3269.771788] loop2: p2 < > p3 p4 [ 3269.775325] loop2: partition table partially beyond EOD, truncated [ 3269.840044] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3269.847822] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3269.891307] loop2: p4 start 1040384000 is beyond EOD, truncated [ 3269.992787] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3270.026714] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3270.038638] loop5: p2 p3 p4 [ 3270.045502] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3270.063957] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3270.072632] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:50 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300705a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4400, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fffffdef63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00f80000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff09ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000003f008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03f80000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fffffff663000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4800, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3270.317371] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3270.343148] ldm_validate_privheads(): Disk read failed. [ 3270.351600] loop3: p2 p3 p4 [ 3270.366770] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3270.375156] loop3: partition table partially beyond EOD, truncated [ 3270.379605] loop2: p2 < > p3 p4 [ 3270.385321] loop2: partition table partially beyond EOD, truncated [ 3270.406283] loop5: p2 p3 p4 [ 3270.419662] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3270.425712] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3270.432155] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:50 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0fff0000008000da55aa", 0x40, 0x1c0}]) [ 3270.489233] loop3: p3 start 225 is beyond EOD, truncated [ 3270.494843] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3270.507564] loop2: p4 start 1056964608 is beyond EOD, truncated 03:04:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4a00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fffffdfc63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3270.574443] ldm_validate_privheads(): Disk read failed. [ 3270.594352] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3270.604741] loop3: p2 p3 p4 [ 3270.617264] loop3: partition table partially beyond EOD, truncated [ 3270.687098] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3270.709231] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3270.730270] loop3: p3 start 225 is beyond EOD, truncated [ 3270.770321] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3271.043435] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3271.058493] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3271.065929] loop5: p2 p3 p4 [ 3271.072799] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3271.081453] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:51 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300707a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000200008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000040008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4a02, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fffffffe63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff0aac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3271.089974] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000400008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00effdffff63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4c00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3271.220134] loop2: p2 < > p3 p4 [ 3271.228503] loop2: partition table partially beyond EOD, truncated [ 3271.277241] ldm_validate_privheads(): Disk read failed. [ 3271.284490] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3271.292886] loop3: p2 p3 p4 [ 3271.306442] loop3: partition table partially beyond EOD, truncated [ 3271.330887] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3271.331839] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3271.354964] loop2: p4 start 1073741824 is beyond EOD, truncated 03:04:51 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00fcfdffff63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3271.375891] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3271.395948] loop3: p3 start 225 is beyond EOD, truncated [ 3271.413754] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x4e03, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3271.433026] loop5: p2 p3 p4 03:04:51 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffffff0f00008000da55aa", 0x40, 0x1c0}]) [ 3271.472540] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3271.481345] loop2: p2 < > p3 p4 [ 3271.492817] loop2: partition table partially beyond EOD, truncated [ 3271.568487] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3271.627146] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3271.637541] loop2: p4 start 1073741824 is beyond EOD, truncated [ 3271.682530] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3271.865789] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3271.893424] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3271.900873] loop5: p2 p3 p4 [ 3271.904465] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:52 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff02000000008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00f6ffffff63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa2ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5001, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff25ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000342008000da55aa", 0x40, 0x1c0}]) [ 3271.914079] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3271.922762] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa3ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00feffffff63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5200, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa4ff1700008000da55aa", 0x40, 0x1c0}]) [ 3272.099683] loop2: p2 < > p3 p4 [ 3272.107499] loop2: partition table partially beyond EOD, truncated 03:04:52 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000d2b000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3272.141449] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3272.153228] ldm_validate_privheads(): Disk read failed. [ 3272.166066] loop3: p2 p3 p4 [ 3272.177065] loop3: partition table partially beyond EOD, truncated [ 3272.200130] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3272.220539] loop2: p4 start 1107492864 is beyond EOD, truncated [ 3272.232891] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:52 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa5ff1700008000da55aa", 0x40, 0x1c0}]) [ 3272.244462] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3272.281404] loop5: p2 p3 p4 [ 3272.327340] loop3: p3 start 225 is beyond EOD, truncated [ 3272.333789] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3272.347550] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3272.401119] ldm_validate_privheads(): Disk read failed. [ 3272.410922] loop3: p2 p3 p4 [ 3272.413013] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3272.424536] loop3: partition table partially beyond EOD, truncated [ 3272.439324] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3272.447224] loop3: p3 start 225 is beyond EOD, truncated [ 3272.449100] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3272.453281] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3272.633916] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3272.648531] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3272.663069] loop5: p2 p3 p4 [ 3272.669768] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3272.686894] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3272.704580] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:53 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff03000000008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5403, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000002000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa6ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000048008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff46ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000003000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.029811] loop2: p2 < > p3 p4 [ 3273.033313] loop2: partition table partially beyond EOD, truncated [ 3273.051093] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa7ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5801, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3273.076816] loop2: p4 start 1207959552 is beyond EOD, truncated 03:04:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000004000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.126031] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3273.152678] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa8ff1700008000da55aa", 0x40, 0x1c0}]) [ 3273.175497] loop2: p2 < > p3 p4 [ 3273.182083] loop2: partition table partially beyond EOD, truncated [ 3273.187871] ldm_validate_privheads(): Disk read failed. [ 3273.194308] loop3: p2 p3 p4 [ 3273.197615] loop5: p2 p3 p4 [ 3273.198058] loop3: partition table partially beyond EOD, truncated [ 3273.212542] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3273.222047] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3273.246737] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000005000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.353502] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3273.356228] loop3: p3 start 225 is beyond EOD, truncated [ 3273.371641] loop2: p4 start 1207959552 is beyond EOD, truncated [ 3273.379854] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3273.381046] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:53 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff04000000008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffa9ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000024a008000da55aa", 0x40, 0x1c0}]) 03:04:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000007000063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.505437] ldm_validate_privheads(): Disk read failed. [ 3273.521213] loop3: p2 p3 p4 [ 3273.527615] loop3: partition table partially beyond EOD, truncated [ 3273.536177] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3273.544438] loop3: p3 start 225 is beyond EOD, truncated 03:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45fc010000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.561516] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:53 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffaaff1700008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000030063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3273.664574] loop2: p2 < > p3 p4 [ 3273.671189] loop2: partition table partially beyond EOD, truncated 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffabff1700008000da55aa", 0x40, 0x1c0}]) [ 3273.783229] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3273.798273] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3273.816198] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000050063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3273.842817] ldm_validate_privheads(): Disk read failed. [ 3273.843624] loop5: p2 p3 p4 [ 3273.849819] loop3: p2 p3 p4 [ 3273.858131] loop3: partition table partially beyond EOD, truncated [ 3273.875085] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3273.886871] loop2: p4 start 1241645056 is beyond EOD, truncated 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffacff1700008000da55aa", 0x40, 0x1c0}]) [ 3273.898443] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3273.952039] loop3: p3 start 225 is beyond EOD, truncated [ 3273.977839] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3273.999633] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3274.060116] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3274.112294] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3274.136053] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3274.143968] loop5: p2 p3 p4 [ 3274.147319] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:54 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff05000000008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000004c008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000070063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5865, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffadff1700008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac020000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3274.156824] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3274.166364] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffaeff1700008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x5a01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000200063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffafff1700008000da55aa", 0x40, 0x1c0}]) [ 3274.310184] loop2: p2 < > p3 p4 [ 3274.313769] loop2: partition table partially beyond EOD, truncated [ 3274.335445] ldm_validate_privheads(): Disk read failed. [ 3274.346175] loop3: p2 p3 p4 [ 3274.372011] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3274.379726] loop3: partition table partially beyond EOD, truncated [ 3274.405680] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:54 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000fdef0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:54 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb0ff1700008000da55aa", 0x40, 0x1c0}]) [ 3274.419292] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3274.423065] loop2: p4 start 1275068416 is beyond EOD, truncated [ 3274.454217] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3274.491892] loop3: p3 start 225 is beyond EOD, truncated [ 3274.501278] loop5: p2 p3 p4 [ 3274.511447] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3274.522022] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3274.549657] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3274.571137] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:55 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff07000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6000, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb1ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000effd0063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000024e008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac030000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb2ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000fffff2d5000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6001, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3274.781027] loop2: p2 < > p3 p4 [ 3274.785795] loop2: partition table partially beyond EOD, truncated [ 3274.809202] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb3ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000020063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3274.826137] loop2: p4 start 1308753920 is beyond EOD, truncated [ 3274.846660] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3274.869126] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb4ff1700008000da55aa", 0x40, 0x1c0}]) [ 3274.887144] loop5: p2 p3 p4 [ 3274.900865] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3274.936465] ldm_validate_privheads(): Disk read failed. [ 3274.980590] loop3: p2 p3 p4 [ 3274.988095] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3274.997305] loop3: partition table partially beyond EOD, truncated [ 3275.016632] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3275.132564] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3275.132795] loop3: p3 start 225 is beyond EOD, truncated [ 3275.155693] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3275.201223] ldm_validate_privheads(): Disk read failed. [ 3275.206772] loop3: p2 p3 p4 [ 3275.214915] loop3: partition table partially beyond EOD, truncated [ 3275.231326] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3275.241095] loop3: p3 start 225 is beyond EOD, truncated [ 3275.246709] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:55 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff21000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000060008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000030063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb5ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac040000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000040063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb6ff1700008000da55aa", 0x40, 0x1c0}]) [ 3275.449668] ldm_validate_privheads(): Disk read failed. [ 3275.478483] loop3: p2 p3 p4 [ 3275.486326] loop3: partition table partially beyond EOD, truncated 03:04:55 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb7ff1700008000da55aa", 0x40, 0x1c0}]) [ 3275.511282] loop2: p2 < > p3 p4 [ 3275.514751] loop2: partition table partially beyond EOD, truncated [ 3275.535961] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3275.546548] loop2: p4 start 1610612736 is beyond EOD, truncated [ 3275.553731] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6088, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:55 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000050063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000364008000da55aa", 0x40, 0x1c0}]) [ 3275.575351] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3275.615350] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3275.634505] loop3: p3 start 225 is beyond EOD, truncated [ 3275.655526] loop5: p2 p3 p4 [ 3275.663145] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3275.740468] loop2: p2 < > p3 p4 [ 3275.744448] loop2: partition table partially beyond EOD, truncated [ 3275.754797] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3275.774907] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3275.801798] loop2: p4 start 1677918208 is beyond EOD, truncated [ 3275.844190] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3275.929442] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:56 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00030000008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb8ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000070063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6202, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac050000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000068008000da55aa", 0x40, 0x1c0}]) [ 3275.970311] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3275.980988] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3275.987430] loop5: p2 p3 p4 [ 3275.991086] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3275.999448] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3276.007717] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffb9ff1700008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000363000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6558, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3276.132346] loop2: p2 < > p3 p4 [ 3276.135954] loop2: partition table partially beyond EOD, truncated 03:04:56 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbaff1700008000da55aa", 0x40, 0x1c0}]) 03:04:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6800, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3276.185365] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3276.215798] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:04:56 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000563000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3276.238100] loop2: p4 start 1744830464 is beyond EOD, truncated [ 3276.254334] ldm_validate_privheads(): Disk read failed. [ 3276.256985] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3276.266609] loop3: p2 p3 p4 [ 3276.301803] loop3: partition table partially beyond EOD, truncated [ 3276.312144] loop2: p2 < > p3 p4 [ 3276.322350] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3276.326699] loop5: p2 p3 p4 [ 3276.342710] loop2: partition table partially beyond EOD, truncated [ 3276.354657] loop3: p3 start 225 is beyond EOD, truncated [ 3276.361351] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3276.368065] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3276.402613] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3276.451753] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3276.458640] loop2: p4 start 1744830464 is beyond EOD, truncated [ 3276.505925] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:57 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00050000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbbff1700008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000763000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:57 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000006c008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac060000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbcff1700008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000002063000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6c00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffbdff1700008000da55aa", 0x40, 0x1c0}]) [ 3276.770155] loop2: p2 < > p3 p4 [ 3276.777483] loop2: partition table partially beyond EOD, truncated 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000fdef63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3276.822586] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3276.834922] ldm_validate_privheads(): Disk read failed. [ 3276.842334] loop3: p2 p3 p4 [ 3276.845848] loop3: partition table partially beyond EOD, truncated [ 3276.875481] loop2: p4 start 1811939328 is beyond EOD, truncated [ 3276.875573] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3276.887874] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:04:57 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000074008000da55aa", 0x40, 0x1c0}]) [ 3276.926947] loop3: p3 start 225 is beyond EOD, truncated [ 3276.956291] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3277.034569] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3277.050579] loop5: p2 p3 p4 [ 3277.071199] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3277.080371] loop2: p2 < > p3 p4 [ 3277.089764] loop2: partition table partially beyond EOD, truncated [ 3277.096362] ldm_validate_privheads(): Disk read failed. [ 3277.103252] loop3: p2 p3 p4 [ 3277.123335] loop3: partition table partially beyond EOD, truncated [ 3277.145419] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3277.154724] loop2: p4 start 1946157056 is beyond EOD, truncated [ 3277.155794] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3277.165468] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3277.176434] loop3: p3 start 225 is beyond EOD, truncated [ 3277.186568] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3277.206952] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3277.343093] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3277.343104] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3277.354261] loop5: p2 p3 p4 [ 3277.354502] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3277.355758] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3277.356987] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:04:57 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00070000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000001008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000effd63000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x6c01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:57 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000278008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac070000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000002008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000d2b000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:57 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000263000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7001, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3277.621718] loop2: p2 < > p3 p4 [ 3277.625283] loop2: partition table partially beyond EOD, truncated 03:04:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003008000da55aa", 0x40, 0x1c0}]) [ 3277.663387] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3277.684549] loop2: p4 start 2013396992 is beyond EOD, 03:04:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000363000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3277.702485] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3277.704474] truncated [ 3277.707923] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3277.739846] ldm_validate_privheads(): Disk read failed. [ 3277.745278] loop3: p2 p3 p4 [ 3277.753794] loop3: partition table partially beyond EOD, truncated [ 3277.761262] loop5: p2 p3 p4 [ 3277.768427] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3277.782423] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3277.827463] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3277.839384] loop3: p3 start 225 is beyond EOD, truncated [ 3277.851739] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3277.885797] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3277.997372] ldm_validate_privheads(): Disk read failed. [ 3278.003877] loop3: p2 p3 p4 [ 3278.007285] loop3: partition table partially beyond EOD, truncated [ 3278.083606] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3278.110122] loop3: p3 start 225 is beyond EOD, truncated [ 3278.122737] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000004008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000463000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000007a008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7400, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:58 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff08100000008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac080000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7801, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000104008000da55aa", 0x40, 0x1c0}]) 03:04:58 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000563000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3278.465742] loop2: p2 < > p3 p4 [ 3278.469673] loop2: partition table partially beyond EOD, truncated 03:04:58 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000005008000da55aa", 0x40, 0x1c0}]) [ 3278.519639] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3278.540507] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3278.568177] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000006008000da55aa", 0x40, 0x1c0}]) [ 3278.594352] ldm_validate_privheads(): Disk read failed. [ 3278.605277] loop3: p2 p3 p4 [ 3278.614416] loop2: p4 start 2046820352 is beyond EOD, truncated [ 3278.624534] loop5: p2 p3 p4 [ 3278.629382] loop3: partition table partially beyond EOD, truncated 03:04:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:59 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000763000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3278.666317] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3278.678475] loop2: p2 < > p3 p4 [ 3278.684023] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3278.686943] loop2: partition table partially beyond EOD, truncated [ 3278.726584] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3278.754919] loop2: p4 start 2046820352 is beyond EOD, truncated [ 3278.755177] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000007008000da55aa", 0x40, 0x1c0}]) [ 3278.776440] loop3: p3 start 225 is beyond EOD, truncated 03:04:59 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000017a008000da55aa", 0x40, 0x1c0}]) [ 3278.812378] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:04:59 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000f2d5000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3278.956626] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3278.960613] loop2: p2 < > p3 p4 [ 3278.966694] loop2: partition table partially beyond EOD, truncated [ 3278.986865] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3278.997237] loop2: p4 start 2046885888 is beyond EOD, truncated 03:04:59 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff08800000008000da55aa", 0x40, 0x1c0}]) 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000008008000da55aa", 0x40, 0x1c0}]) 03:04:59 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000002b0d0800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:04:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:59 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000280008000da55aa", 0x40, 0x1c0}]) 03:04:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac090000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3279.303792] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3279.321197] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3279.347412] loop5: p2 p3 p4 [ 3279.365019] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000308008000da55aa", 0x40, 0x1c0}]) 03:04:59 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000d5f20800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3279.399561] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3279.431993] loop2: p2 < > p3 p4 [ 3279.435455] loop2: partition table partially beyond EOD, truncated 03:04:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7a00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3279.454680] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3279.464387] ldm_validate_privheads(): Disk read failed. [ 3279.471971] loop3: p2 p3 p4 [ 3279.475143] loop3: partition table partially beyond EOD, truncated [ 3279.487551] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000009008000da55aa", 0x40, 0x1c0}]) [ 3279.505314] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3279.536769] loop2: p4 start 2147614720 is beyond EOD, truncated 03:04:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x7e00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:04:59 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000000a008000da55aa", 0x40, 0x1c0}]) [ 3279.580033] loop3: p3 start 225 is beyond EOD, truncated [ 3279.621702] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3279.656815] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3279.689482] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3279.745458] loop5: p2 p3 p4 [ 3279.756798] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3279.807737] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3279.863288] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3279.920170] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3279.930239] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3279.936693] loop5: p2 p3 p4 [ 3279.940517] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3279.948630] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3279.957358] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:05:00 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6fffffffdef0000008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063020800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff41a9e50b008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000081008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8003, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac100000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000010c008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8100, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063030800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000010008000da55aa", 0x40, 0x1c0}]) [ 3280.201899] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3280.221216] loop2: p2 < > p3 p4 [ 3280.225560] loop2: partition table partially beyond EOD, truncated [ 3280.231664] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3280.247440] loop5: p2 p3 p4 03:05:00 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063040800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3280.256902] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3280.258701] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3280.276585] ldm_validate_privheads(): Disk read failed. [ 3280.287523] loop3: p2 p3 p4 [ 3280.293387] loop3: partition table partially beyond EOD, truncated 03:05:00 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000210008000da55aa", 0x40, 0x1c0}]) [ 3280.330026] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3280.341609] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3280.364023] loop2: p4 start 2164260864 is beyond EOD, truncated [ 3280.380448] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3280.401069] loop3: p3 start 225 is beyond EOD, truncated [ 3280.436814] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3280.599423] ldm_validate_privheads(): Disk read failed. [ 3280.605665] loop3: p2 p3 p4 [ 3280.613652] loop3: partition table partially beyond EOD, truncated [ 3280.628884] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3280.647326] loop3: p3 start 225 is beyond EOD, truncated [ 3280.653480] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:05:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffffeffd0000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063050800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8201, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:01 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000285008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000012008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac230000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063070800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000319008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8401, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000e00000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000001c008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063002000000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3281.145507] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3281.155408] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3281.164283] ldm_validate_privheads(): Disk read failed. [ 3281.167087] loop5: p2 p3 p4 [ 3281.177953] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3281.181043] loop3: p2 p3 p4 [ 3281.208745] loop3: partition table partially beyond EOD, truncated [ 3281.241263] loop2: p2 < > p3 p4 [ 3281.245076] loop2: partition table partially beyond EOD, truncated [ 3281.248463] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3281.260185] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3281.345908] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3281.354825] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 3281.367838] loop3: p3 start 225 is beyond EOD, truncated [ 3281.377288] loop2: p4 start 2231500800 is beyond EOD, truncated [ 3281.388260] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3281.444009] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3281.458958] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3281.473396] loop5: p2 p3 p4 [ 3281.480811] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:05:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff1ffff000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000021c008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8603, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000e00000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000028a008000da55aa", 0x40, 0x1c0}]) [ 3281.490639] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3281.498566] loop5: p4 size 3657465856 extends beyond EOD, truncated 03:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac480000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:01 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000804000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000001f008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8801, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000014000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3281.678149] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3281.705556] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3281.720954] loop2: p2 < > p3 p4 03:05:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000020008000da55aa", 0x40, 0x1c0}]) [ 3281.724578] loop2: partition table partially beyond EOD, truncated [ 3281.756537] loop5: p2 p3 p4 [ 3281.760739] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3281.765815] loop5: partition table partially beyond EOD, truncated [ 3281.786610] ldm_validate_privheads(): Disk read failed. [ 3281.797792] loop3: p2 p3 p4 03:05:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000802000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3281.808569] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3281.829468] loop2: p4 start 2315386880 is beyond EOD, truncated [ 3281.841197] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3281.873592] loop3: partition table partially beyond EOD, truncated [ 3281.896393] loop5: p4 start 15793951 is beyond EOD, truncated [ 3281.920668] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3282.001376] loop3: p3 start 225 is beyond EOD, truncated [ 3282.007316] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3282.042002] ldm_validate_privheads(): Disk read failed. [ 3282.047634] loop3: p2 p3 p4 [ 3282.067302] loop3: partition table partially beyond EOD, truncated [ 3282.075569] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3282.084236] loop3: p3 start 225 is beyond EOD, truncated 03:05:02 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000001008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000222008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000803000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:02 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000018c008000da55aa", 0x40, 0x1c0}]) [ 3282.093116] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac4c0000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000804000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000023008000da55aa", 0x40, 0x1c0}]) [ 3282.197777] loop2: p2 < > p3 p4 [ 3282.202854] loop2: partition table partially beyond EOD, truncated [ 3282.254608] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3282.281947] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3282.295344] loop2: p4 start 2348875776 is beyond EOD, truncated 03:05:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:02 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000126008000da55aa", 0x40, 0x1c0}]) 03:05:02 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000805000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3282.309035] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3282.365547] loop5: p2 p3 p4 [ 3282.368828] loop5: partition table partially beyond EOD, truncated [ 3282.378675] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3282.413557] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:05:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8a02, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3282.472911] ldm_validate_privheads(): Disk read failed. [ 3282.478652] loop3: p2 p3 p4 [ 3282.489140] loop5: p4 start 16777216 is beyond EOD, truncated [ 3282.516470] loop3: partition table partially beyond EOD, truncated [ 3282.545080] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:05:03 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000002008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000228008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000038c008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000807000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3282.582893] loop3: p3 start 225 is beyond EOD, truncated [ 3282.588527] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac600000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8a03, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000130008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000821000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000230008000da55aa", 0x40, 0x1c0}]) 03:05:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x8c02, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3282.921435] loop2: p2 < > p3 p4 [ 3282.924986] loop2: partition table partially beyond EOD, truncated [ 3282.954196] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3282.961822] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3282.976487] loop2: p4 start 2349006848 is beyond EOD, truncated [ 3282.983609] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3283.004425] loop5: p2 p3 p4 [ 3283.011113] loop5: partition table partially beyond EOD, truncated [ 3283.019789] ldm_validate_privheads(): Disk read failed. 03:05:03 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000003f008000da55aa", 0x40, 0x1c0}]) [ 3283.025553] loop3: p2 p3 p4 [ 3283.028726] loop3: partition table partially beyond EOD, truncated [ 3283.052780] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:05:03 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800030000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3283.073808] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3283.112439] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3283.121988] loop3: p3 start 225 is beyond EOD, truncated [ 3283.131106] loop5: p4 start 33554432 is beyond EOD, truncated [ 3283.179880] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3283.205233] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3283.254580] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3283.288796] loop5: p2 p3 p4 [ 3283.294494] loop5: partition table partially beyond EOD, truncated [ 3283.306845] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3283.508897] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3283.630081] loop5: p4 start 33554432 is beyond EOD, truncated 03:05:04 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000003008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000028e008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000240008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800050000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac680000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000340008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800070000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3283.810782] loop2: p2 < > p3 p4 [ 3283.814287] loop2: partition table partially beyond EOD, truncated 03:05:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9401, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3283.863703] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3283.873232] ldm_validate_privheads(): Disk read failed. [ 3283.879009] loop3: p2 p3 p4 [ 3283.902101] loop2: p4 start 2382495744 is beyond EOD, truncated [ 3283.911935] loop3: partition table partially beyond EOD, truncated 03:05:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000808100000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3283.979480] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3283.989316] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:05:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800200000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000298008000da55aa", 0x40, 0x1c0}]) [ 3284.019882] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3284.039695] loop5: p2 p3 p4 [ 3284.045574] loop5: partition table partially beyond EOD, truncated [ 3284.065197] loop3: p3 start 225 is beyond EOD, truncated [ 3284.078561] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3284.090958] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3284.146980] ldm_validate_privheads(): Disk read failed. [ 3284.168562] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3284.174046] loop3: p2 p3 p4 [ 3284.178313] loop3: partition table partially beyond EOD, truncated [ 3284.209334] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3284.213581] loop5: p4 start 50331648 is beyond EOD, truncated [ 3284.236159] loop3: p3 start 225 is beyond EOD, truncated [ 3284.241012] loop2: p2 < > p3 p4 [ 3284.246249] loop2: partition table partially beyond EOD, truncated [ 3284.254520] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3284.284114] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3284.323050] loop2: p4 start 2550267904 is beyond EOD, truncated 03:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac6c0000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0be5a941008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9402, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:04 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000002a4008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000004008000da55aa", 0x40, 0x1c0}]) 03:05:04 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000808800000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fdef0000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000048008000da55aa", 0x40, 0x1c0}]) [ 3284.621516] ldm_validate_privheads(): Disk read failed. [ 3284.634229] loop3: p2 p3 p4 03:05:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9801, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3284.663785] loop3: partition table partially beyond EOD, truncated [ 3284.684998] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008effd0000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3284.707466] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:05:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6fffffff98d254a008000da55aa", 0x40, 0x1c0}]) [ 3284.738271] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3284.743535] loop3: p3 start 225 is beyond EOD, truncated [ 3284.758929] loop5: p2 p3 p4 [ 3284.765483] loop2: p2 < > p3 p4 [ 3284.775935] loop2: partition table partially beyond EOD, truncated 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800002000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3284.788222] loop5: partition table partially beyond EOD, truncated [ 3284.796239] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3284.836984] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3284.840643] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3284.879034] ldm_validate_privheads(): Disk read failed. [ 3284.883906] loop2: p4 start 2751594496 is beyond EOD, truncated [ 3284.911030] loop3: p2 p3 p4 [ 3284.944357] loop3: partition table partially beyond EOD, truncated [ 3284.968320] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3284.987596] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3285.021596] loop3: p3 start 225 is beyond EOD, truncated [ 3285.033934] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3285.034108] loop5: p4 start 67108864 is beyond EOD, truncated [ 3285.131896] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3285.141632] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3285.147833] loop5: p2 p3 p4 [ 3285.150974] loop5: partition table partially beyond EOD, truncated [ 3285.157905] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3285.166945] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:05:05 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000005008000da55aa", 0x40, 0x1c0}]) [ 3285.176547] loop5: p4 start 67108864 is beyond EOD, truncated 03:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac740000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9802, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000004c008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001ac008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000006300081ffff000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x9e00, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000034c008000da55aa", 0x40, 0x1c0}]) 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000001000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3285.411576] ldm_validate_privheads(): Disk read failed. [ 3285.438348] loop3: p2 p3 p4 [ 3285.455667] loop3: partition table partially beyond EOD, truncated [ 3285.476347] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3285.480358] loop2: p2 < > p3 p4 [ 3285.487584] loop2: partition table partially beyond EOD, truncated 03:05:05 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000054008000da55aa", 0x40, 0x1c0}]) [ 3285.514964] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3285.546715] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:05:05 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000002000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3285.570850] loop2: p4 start 2885746688 is beyond EOD, truncated [ 3285.580464] loop3: p3 start 225 is beyond EOD, truncated 03:05:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa000, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3285.620646] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3285.647960] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3285.676109] loop5: p2 p3 p4 [ 3285.688286] loop5: partition table partially beyond EOD, truncated [ 3285.733496] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3285.791617] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3285.984127] loop5: p4 start 83886080 is beyond EOD, truncated [ 3285.996661] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3286.013958] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3286.031042] loop5: p2 p3 p4 [ 3286.034164] loop5: partition table partially beyond EOD, truncated [ 3286.042372] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3286.054282] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3286.062858] loop5: p4 start 83886080 is beyond EOD, truncated 03:05:06 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000007008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000158008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001c4008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000003000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa003, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac7a0000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa401, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000258008000da55aa", 0x40, 0x1c0}]) [ 3286.221045] loop2: p2 < > p3 p4 [ 3286.224595] loop2: partition table partially beyond EOD, truncated [ 3286.235057] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3286.265276] loop2: p4 start 3288399872 is beyond EOD, truncated 03:05:06 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000004000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xa803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3286.337025] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3286.357570] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:05:06 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000005000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:06 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000005a008000da55aa", 0x40, 0x1c0}]) [ 3286.383107] ldm_validate_privheads(): Disk read failed. [ 3286.390642] loop3: p2 p3 p4 [ 3286.398533] loop3: partition table partially beyond EOD, truncated [ 3286.446778] loop5: p2 p3 p4 [ 3286.455954] loop5: partition table partially beyond EOD, truncated [ 3286.469248] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3286.487374] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3286.527758] loop3: p3 start 225 is beyond EOD, truncated [ 3286.545279] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3286.577422] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3286.622562] loop5: p4 start 117440512 is beyond EOD, truncated [ 3286.633962] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3286.657929] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3286.665474] loop5: p2 p3 p4 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000005c008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001cc008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000007000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00001008008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xb001, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3286.668572] loop5: partition table partially beyond EOD, truncated [ 3286.676707] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3286.685741] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3286.694624] loop5: p4 start 117440512 is beyond EOD, truncated 03:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000300000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000005e008000da55aa", 0x40, 0x1c0}]) [ 3286.847598] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3286.874399] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:05:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800001008000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3286.900992] loop5: p2 p3 p4 [ 3286.901732] loop2: p2 < > p3 p4 [ 3286.907619] loop2: partition table partially beyond EOD, truncated [ 3286.910849] loop5: partition table partially beyond EOD, truncated 03:05:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xb002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000060008000da55aa", 0x40, 0x1c0}]) [ 3286.945034] ldm_validate_privheads(): Disk read failed. [ 3286.953863] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3286.957545] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3286.963010] loop3: p2 p3 p4 [ 3286.978534] loop3: partition table partially beyond EOD, truncated [ 3286.988089] loop2: p4 start 3422617600 is beyond EOD, truncated [ 3286.998059] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:05:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800008008000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3287.045794] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3287.075484] loop3: p3 start 225 is beyond EOD, truncated 03:05:07 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000003d3008000da55aa", 0x40, 0x1c0}]) [ 3287.099146] loop5: p4 start 135266304 is beyond EOD, truncated [ 3287.100106] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3287.135296] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 03:05:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xb201, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000164008000da55aa", 0x40, 0x1c0}]) [ 3287.164012] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3287.193642] loop5: p2 p3 p4 03:05:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800f0ff1f000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3287.224141] loop5: partition table partially beyond EOD, truncated [ 3287.290989] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3287.317721] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3287.336305] loop5: p4 start 135266304 is beyond EOD, truncated [ 3287.352108] loop2: p2 < > p3 p4 [ 3287.355644] loop2: partition table partially beyond EOD, truncated [ 3287.376429] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:05:07 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00008008008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000364008000da55aa", 0x40, 0x1c0}]) [ 3287.387906] loop2: p4 start 3540189184 is beyond EOD, truncated 03:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac190300000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xb402, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:07 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000020000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000068008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000000de008000da55aa", 0x40, 0x1c0}]) 03:05:07 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000168008000da55aa", 0x40, 0x1c0}]) [ 3287.581172] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3287.606085] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 03:05:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xbc01, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000021000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3287.643340] loop5: p2 p3 p4 [ 3287.655252] ldm_validate_privheads(): Disk read failed. [ 3287.665388] loop5: partition table partially beyond EOD, truncated [ 3287.672781] loop3: p2 p3 p4 [ 3287.681360] loop3: partition table partially beyond EOD, truncated [ 3287.685743] loop2: p2 < > p3 p4 03:05:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000368008000da55aa", 0x40, 0x1c0}]) [ 3287.693123] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3287.695497] loop2: partition table partially beyond EOD, truncated [ 3287.706787] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3287.729271] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:05:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xbc03, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 3287.779744] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3287.801090] loop2: p4 start 3724541952 is beyond EOD, truncated [ 3287.813490] loop3: p3 start 225 is beyond EOD, truncated [ 3287.819548] loop5: p4 start 142606336 is beyond EOD, truncated [ 3287.835027] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3287.914918] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3287.925659] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3287.936477] loop5: p2 p3 p4 [ 3287.944381] loop5: partition table partially beyond EOD, truncated [ 3288.026942] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3288.070321] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3288.114358] loop5: p4 start 142606336 is beyond EOD, truncated [ 3288.286225] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3288.306924] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3288.313275] loop5: p2 p3 p4 [ 3288.316313] loop5: partition table partially beyond EOD, truncated [ 3288.324257] loop5: p2 size 1073872896 extends beyond EOD, truncated 03:05:08 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00f0ff1f008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fffffdef000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000006c008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc000, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:08 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001de008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000500000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3288.332101] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3288.340044] loop5: p4 start 142606336 is beyond EOD, truncated 03:05:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fffffff6000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000370008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000074008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fffffdfc000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3288.464000] loop2: p2 < > p3 p4 [ 3288.467581] loop2: partition table partially beyond EOD, truncated [ 3288.505657] ldm_validate_privheads(): Disk read failed. [ 3288.524582] loop3: p2 p3 p4 [ 3288.528499] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:05:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fffffffe000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:08 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000174008000da55aa", 0x40, 0x1c0}]) [ 3288.548461] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3288.575010] loop3: partition table partially beyond EOD, truncated [ 3288.586535] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3288.593841] loop2: p4 start 3724607488 is beyond EOD, truncated [ 3288.603851] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3288.617910] loop5: p2 p3 p4 [ 3288.631372] loop5: partition table partially beyond EOD, truncated [ 3288.644876] loop3: p3 start 225 is beyond EOD, truncated [ 3288.654404] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3288.664217] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3288.724854] ldm_validate_privheads(): Disk read failed. [ 3288.750420] loop3: p2 p3 p4 [ 3288.753466] loop3: partition table partially beyond EOD, truncated [ 3288.798481] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3288.816869] loop3: p3 start 225 is beyond EOD, truncated [ 3288.824471] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3288.830438] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3288.854100] loop5: p4 start 536866816 is beyond EOD, truncated 03:05:09 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000020008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc001, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:09 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008effdffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000176008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001ea008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000600000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008fcfdffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000078008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc002, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000378008000da55aa", 0x40, 0x1c0}]) 03:05:09 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008f6ffffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3289.168806] loop2: p2 < > p3 p4 [ 3289.172601] loop2: partition table partially beyond EOD, truncated [ 3289.203572] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3289.211423] ldm_validate_privheads(): Disk read failed. [ 3289.220513] loop2: p4 start 3925934080 is beyond EOD, truncated [ 3289.223877] loop3: p2 p3 p4 [ 3289.243865] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3289.246859] loop3: partition table partially beyond EOD, truncated [ 3289.262548] loop2: p2 < > p3 p4 03:05:09 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff0000007a008000da55aa", 0x40, 0x1c0}]) [ 3289.267133] loop2: partition table partially beyond EOD, truncated [ 3289.279569] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3289.288222] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3289.306777] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3289.320187] loop5: p2 p3 p4 [ 3289.330283] loop5: partition table partially beyond EOD, truncated [ 3289.339046] loop2: p4 start 3925934080 is beyond EOD, truncated [ 3289.362044] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3289.363479] loop3: p3 start 225 is beyond EOD, truncated [ 3289.426419] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3289.437908] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3289.566970] loop5: p4 start 536870912 is beyond EOD, truncated [ 3289.604337] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3289.621397] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3289.638183] loop5: p2 p3 p4 [ 3289.642282] loop5: partition table partially beyond EOD, truncated [ 3289.649144] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3289.658456] loop5: p3 size 1912633224 extends beyond EOD, truncated 03:05:10 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x800, 0x6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000021008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008feffffff000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc003, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000182008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth0_macvtap\x00'}) syz_extract_tcp_res(0x0, 0x800, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff000001ee008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000700000042000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3289.667682] loop5: p4 start 536870912 is beyond EOD, truncated 03:05:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000184008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000044000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0xc803, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 03:05:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000000000630008000000000000000e4000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3289.832977] loop2: p2 < > p3 p4 [ 3289.836491] loop2: partition table partially beyond EOD, truncated [ 3289.856507] ldm_validate_privheads(): Disk read failed. [ 3289.872304] loop3: p2 p3 p4 [ 3289.889853] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 3289.894343] loop3: partition table partially beyond EOD, truncated [ 3289.922920] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3289.934731] syz-executor.4: page allocation failure: order:5, mode:0x484020(GFP_ATOMIC|__GFP_COMP), nodemask=(null) [ 3289.945328] syz-executor.4 cpuset=/ mems_allowed=0-1 [ 3289.950904] CPU: 1 PID: 26980 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 3289.952215] loop2: p4 start 3993042944 is beyond EOD, truncated [ 3289.958780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3289.958787] Call Trace: [ 3289.958811] dump_stack+0x1fc/0x2ef [ 3289.958831] warn_alloc.cold+0x7b/0x18f [ 3289.958847] ? zone_watermark_ok_safe+0x260/0x260 [ 3289.958863] ? wakeup_kcompactd+0x21d/0x540 [ 3289.977848] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3289.980520] ? wakeup_kswapd+0x151/0x660 [ 3289.980539] ? __zone_watermark_ok+0x300/0x300 [ 3289.980554] ? wake_all_kswapds+0x143/0x2c0 [ 3289.980573] ? cache_grow_begin+0xa4/0x8a0 [ 3289.980586] __alloc_pages_nodemask+0x232f/0x2890 [ 3289.980616] ? batadv_hash_new+0x6f/0x290 [ 3289.980632] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3289.980647] ? mark_held_locks+0xf0/0xf0 [ 3289.980661] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3289.980675] ? netlink_sendmsg+0x6c3/0xc50 [ 3289.980690] ? sock_sendmsg+0xc3/0x120 [ 3289.980701] ? ___sys_sendmsg+0x7bb/0x8e0 [ 3289.980721] ? ____cache_alloc_node+0xf4/0x1d0 [ 3289.980738] ? __kmalloc+0x213/0x3c0 [ 3289.980757] cache_grow_begin+0xa4/0x8a0 [ 3289.980778] fallback_alloc+0x213/0x2e0 [ 3289.980798] __kmalloc+0x213/0x3c0 [ 3289.980810] ? batadv_hash_new+0xaa/0x290 [ 3289.980827] batadv_hash_new+0xaa/0x290 [ 3289.980848] batadv_originator_init+0x51/0x240 [ 3289.980862] batadv_mesh_init+0x46a/0x690 [ 3289.980880] batadv_softif_init_late+0xad7/0xd90 [ 3289.980897] ? batadv_get_strings+0x40/0x40 [ 3289.980915] ? batadv_get_strings+0x40/0x40 [ 3289.980932] register_netdevice+0x2dc/0x10f0 [ 3289.980952] ? unregister_netdev+0x20/0x20 [ 3289.980968] ? rtnl_create_link+0x145/0xa40 [ 3289.980987] rtnl_newlink+0x13b5/0x15c0 [ 3289.981009] ? rtnl_getlink+0x620/0x620 [ 3289.981035] ? mark_held_locks+0xf0/0xf0 [ 3289.981051] ? unwind_next_frame+0xeee/0x1400 [ 3289.981065] ? __save_stack_trace+0x72/0x190 [ 3289.981079] ? deref_stack_reg+0x134/0x1d0 [ 3289.981091] ? get_reg+0x176/0x1f0 [ 3289.981107] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 3289.981121] ? deref_stack_reg+0x1d0/0x1d0 [ 3289.981140] ? is_bpf_text_address+0xd5/0x1b0 [ 3289.981157] ? lock_downgrade+0x720/0x720 [ 3289.981171] ? lock_acquire+0x170/0x3c0 [ 3289.981184] ? __bpf_address_lookup+0x330/0x330 [ 3289.981201] ? check_preemption_disabled+0x41/0x280 [ 3289.981219] ? is_bpf_text_address+0xfc/0x1b0 [ 3289.981236] ? kernel_text_address+0xbd/0xf0 [ 3289.981252] ? __kernel_text_address+0x9/0x30 [ 3289.981267] ? unwind_get_return_address+0x51/0x90 [ 3289.981283] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3289.981296] ? __save_stack_trace+0xaf/0x190 [ 3289.981313] ? __lock_acquire+0x6de/0x3ff0 [ 3289.981335] ? __kasan_slab_free+0x186/0x1f0 [ 3289.981349] ? kmem_cache_free+0x7f/0x260 [ 3289.981363] ? kfree_skbmem+0xc1/0x140 [ 3289.981374] ? consume_skb+0x120/0x3d0 [ 3289.981388] ? mark_held_locks+0xf0/0xf0 [ 3289.981400] ? netlink_deliver_tap+0x8fb/0xb00 [ 3289.981411] ? netlink_unicast+0x545/0x690 [ 3289.981422] ? netlink_sendmsg+0x6c3/0xc50 [ 3289.981437] ? sock_sendmsg+0xc3/0x120 [ 3289.981448] ? ___sys_sendmsg+0x7bb/0x8e0 [ 3289.981460] ? __x64_sys_sendmsg+0x132/0x220 [ 3289.981473] ? do_syscall_64+0xf9/0x620 [ 3289.981488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3289.981541] ? mutex_trylock+0x1a0/0x1a0 [ 3290.017496] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3290.018669] ? check_preemption_disabled+0x41/0x280 [ 3290.018689] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 3290.018715] ? rtnl_getlink+0x620/0x620 [ 3290.018731] rtnetlink_rcv_msg+0x453/0xb80 [ 3290.051147] loop3: p3 start 225 is beyond EOD, truncated [ 3290.054037] ? rtnl_calcit.isra.0+0x430/0x430 [ 3290.054056] ? memcpy+0x35/0x50 [ 3290.054071] ? netdev_pick_tx+0x2f0/0x2f0 [ 3290.054086] ? __copy_skb_header+0x414/0x500 [ 3290.054104] ? kfree_skbmem+0x140/0x140 [ 3290.070165] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3290.070494] netlink_rcv_skb+0x160/0x440 [ 3290.070512] ? rtnl_calcit.isra.0+0x430/0x430 [ 3290.078228] loop5: p2 p3 p4 [ 3290.082226] ? netlink_ack+0xae0/0xae0 [ 3290.082254] netlink_unicast+0x4d5/0x690 [ 3290.082271] ? netlink_sendskb+0x110/0x110 [ 3290.082282] ? _copy_from_iter_full+0x229/0x7c0 [ 3290.082296] ? __phys_addr_symbol+0x2c/0x70 [ 3290.082312] ? __check_object_size+0x17b/0x3e0 [ 3290.082330] netlink_sendmsg+0x6c3/0xc50 [ 3290.082347] ? aa_af_perm+0x230/0x230 [ 3290.082366] ? nlmsg_notify+0x1f0/0x1f0 [ 3290.082379] ? kernel_recvmsg+0x220/0x220 [ 3290.082401] ? nlmsg_notify+0x1f0/0x1f0 [ 3290.082418] sock_sendmsg+0xc3/0x120 [ 3290.082433] ___sys_sendmsg+0x7bb/0x8e0 [ 3290.082449] ? copy_msghdr_from_user+0x440/0x440 [ 3290.082466] ? __fget+0x32f/0x510 [ 3290.082485] ? lock_downgrade+0x720/0x720 [ 3290.082501] ? check_preemption_disabled+0x41/0x280 [ 3290.082519] ? check_preemption_disabled+0x41/0x280 [ 3290.082537] ? __fget+0x356/0x510 [ 3290.082553] ? do_dup2+0x450/0x450 [ 3290.082568] ? __fd_install+0x1b4/0x610 [ 3290.082586] ? __fdget+0x1d0/0x230 [ 3290.082605] __x64_sys_sendmsg+0x132/0x220 [ 3290.082619] ? __sys_sendmsg+0x1b0/0x1b0 [ 3290.082635] ? __se_sys_futex+0x298/0x3b0 03:05:10 executing program 0: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00006088008000da55aa", 0x40, 0x1c0}]) 03:05:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4c8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) syz_read_part_table(0x1000000000000, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000063000800000000000000204000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 3290.082660] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3290.082676] ? trace_hardirqs_off_caller+0x6e/0x210 [ 3290.082688] ? do_syscall_64+0x21/0x620 [ 3290.082704] do_syscall_64+0xf9/0x620 [ 3290.082724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3290.082737] RIP: 0033:0x7f829735b109 [ 3290.082752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3290.082759] RSP: 002b:00007f8295cd0168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3290.082773] RAX: ffffffffffffffda RBX: 00007f829746df60 RCX: 00007f829735b109 [ 3290.082781] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 3290.082789] RBP: 00007f82973b508d R08: 0000000000000000 R09: 0000000000000000 [ 3290.082798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3290.082806] R13: 00007ffc66b3dd5f R14: 00007f8295cd0300 R15: 0000000000022000 [ 3290.083107] Mem-Info: [ 3290.109828] loop5: partition table partially beyond EOD, truncated [ 3290.110659] active_anon:200501 inactive_anon:11756 isolated_anon:0 [ 3290.110659] active_file:1415 inactive_file:1978 isolated_file:32 [ 3290.110659] unevictable:0 dirty:116 writeback:0 unstable:0 [ 3290.110659] slab_reclaimable:26891 slab_unreclaimable:1344474 [ 3290.110659] mapped:25521 shmem:22459 pagetables:1444 bounce:0 [ 3290.110659] free:24693 free_pcp:960 free_cma:0 [ 3290.110686] Node 0 active_anon:665284kB inactive_anon:26176kB active_file:2564kB inactive_file:5260kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:85824kB dirty:56kB writeback:0kB shmem:56624kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 159744kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 3290.110711] Node 1 active_anon:136720kB inactive_anon:20848kB active_file:3096kB inactive_file:2652kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:16260kB dirty:408kB writeback:0kB shmem:33212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 43008kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 3290.110716] Node 0 DMA free:10852kB min:204kB low:252kB high:300kB active_anon:12kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:32kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3290.110747] lowmem_reserve[]: 0 2693 2695 2695 2695 [ 3290.110766] Node 0 DMA32 free:13440kB min:35996kB low:44992kB high:53988kB active_anon:665272kB inactive_anon:26176kB active_file:2564kB inactive_file:5260kB unevictable:0kB writepending:56kB present:3129332kB managed:2763452kB mlocked:0kB kernel_stack:34912kB pagetables:4952kB bounce:0kB free_pcp:1988kB local_pcp:644kB free_cma:0kB [ 3290.110796] lowmem_reserve[]: 0 0 1 1 1 [ 3290.110812] Node 0 Normal free:0kB min:24kB low:28kB high:32kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:2000kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3290.110841] lowmem_reserve[]: 0 0 0 0 0 [ 3290.110859] Node 1 Normal free:74480kB min:53876kB low:67344kB high:80812kB active_anon:136720kB inactive_anon:20848kB active_file:3068kB inactive_file:3088kB unevictable:0kB writepending:408kB present:4194304kB managed:4128248kB mlocked:0kB kernel_stack:139072kB pagetables:824kB bounce:0kB free_pcp:1852kB local_pcp:464kB free_cma:0kB [ 3290.110891] lowmem_reserve[]: 0 0 0 0 0 [ 3290.110908] Node 0 DMA: 5*4kB (UMH) 24*8kB (UMH) 23*16kB (UMEH) 23*32kB (UMEH) 19*64kB (UMEH) 9*128kB (UMEH) 4*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 1*2048kB (M) 0*4096kB = 10852kB [ 3290.110984] Node 0 DMA32: 68*4kB (MEH) 370*8kB (UM) 260*16kB (UME) 181*32kB (UM) 4*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 13440kB [ 3290.111051] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 3290.136015] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 3290.137674] Node 1 Normal: 1783*4kB (UME) 508*8kB (UME) 469*16kB (UMEH) 765*32kB (UMEH) 486*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 74284kB [ 3290.137744] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3290.137754] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3290.137765] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3290.137775] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3290.137781] 25895 total pagecache pages [ 3290.137795] 0 pages in swap cache [ 3290.137808] Swap cache stats: add 0, delete 0, find 0/0 [ 3290.275920] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 3290.278270] Free swap = 0kB [ 3290.278275] Total swap = 0kB [ 3290.278646] 2097051 pages RAM [ 3290.376929] loop5: p4 start 553648128 is beyond EOD, truncated [ 3290.380418] 0 pages HighMem/MovableOnly [ 3290.380423] 369649 pages reserved [ 3290.380428] 0 pages cma reserved [ 3291.051297] ldm_validate_privheads(): Disk read failed. [ 3291.057055] loop3: p2 p3 p4 [ 3291.060082] loop3: partition table partially beyond EOD, truncated [ 3291.071209] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 3291.106652] loop3: p3 start 225 is beyond EOD, truncated [ 3291.113031] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 3291.128718] ------------[ cut here ]------------ [ 3291.133512] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: (null) [ 3291.143870] WARNING: CPU: 0 PID: 26980 at lib/debugobjects.c:325 debug_print_object+0x160/0x250 [ 3291.152711] Kernel panic - not syncing: panic_on_warn set ... [ 3291.152711] [ 3291.161729] CPU: 0 PID: 26980 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 3291.170002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3291.179359] Call Trace: [ 3291.181955] dump_stack+0x1fc/0x2ef [ 3291.185604] panic+0x26a/0x50e [ 3291.188790] ? __warn_printk+0xf3/0xf3 [ 3291.192679] ? debug_print_object+0x160/0x250 [ 3291.197205] ? __probe_kernel_read+0x130/0x1b0 [ 3291.201776] ? __warn.cold+0x5/0x5a [ 3291.205675] ? debug_print_object+0x160/0x250 [ 3291.210175] __warn.cold+0x20/0x5a [ 3291.213713] ? debug_print_object+0x160/0x250 [ 3291.218197] report_bug+0x262/0x2b0 [ 3291.221904] do_error_trap+0x1d7/0x310 [ 3291.225868] ? math_error+0x310/0x310 [ 3291.229669] ? irq_work_claim+0xa6/0xc0 [ 3291.233633] ? irq_work_queue+0x29/0x80 [ 3291.237598] ? error_entry+0x72/0xd0 [ 3291.241300] ? trace_hardirqs_off_caller+0x2c/0x210 [ 3291.246305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3291.251137] invalid_op+0x14/0x20 [ 3291.254577] RIP: 0010:debug_print_object+0x160/0x250 [ 3291.259757] Code: dd 20 f1 b3 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 00 00 00 48 8b 14 dd 20 f1 b3 88 48 c7 c7 40 e5 b3 88 e8 65 92 7b 04 <0f> 0b 83 05 73 e6 af 07 01 48 83 c4 20 5b 5d 41 5c 41 5d c3 48 89 [ 3291.278902] RSP: 0000:ffff8881936cec10 EFLAGS: 00010086 [ 3291.284344] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 3291.291609] RDX: 0000000000040000 RSI: ffffffff814dff01 RDI: ffffed10326d9d74 [ 3291.298966] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 3291.306229] R10: 0000000000000005 R11: ffffffff8c66501b R12: ffffffff89f90a40 [ 3291.313659] R13: ffffffff815313f0 R14: ffff888143036480 R15: 1ffff110326d9d8d [ 3291.320935] ? calc_wheel_index+0x230/0x230 [ 3291.325248] ? vprintk_func+0x81/0x180 [ 3291.329131] debug_object_assert_init+0x1f0/0x2e0 [ 3291.333958] ? debug_object_free+0x380/0x380 [ 3291.338443] ? mark_held_locks+0xf0/0xf0 [ 3291.342508] ? batadv_mesh_init+0x5b7/0x690 [ 3291.346816] ? batadv_softif_init_late+0xad7/0xd90 [ 3291.351792] ? register_netdevice+0x2dc/0x10f0 [ 3291.356396] ? rtnl_newlink+0x13b5/0x15c0 [ 3291.360535] ? rtnetlink_rcv_msg+0x453/0xb80 [ 3291.364933] ? netlink_rcv_skb+0x160/0x440 [ 3291.370419] ? netlink_unicast+0x4d5/0x690 [ 3291.375051] del_timer+0x6d/0x100 [ 3291.378500] ? run_timer_softirq+0x670/0x670 [ 3291.382919] ? batadv_tvlv_handler_get+0x314/0x470 [ 3291.387860] ? trace_hardirqs_off+0x64/0x200 [ 3291.392269] try_to_grab_pending+0x2b6/0x6f0 [ 3291.396678] __cancel_work_timer+0xa6/0x590 [ 3291.400988] ? try_to_grab_pending+0x6f0/0x6f0 [ 3291.405571] ? batadv_tvlv_handler_get+0x33b/0x470 [ 3291.410489] ? batadv_tvlv_handler_put+0x40/0x40 [ 3291.415235] ? mark_held_locks+0xa6/0xf0 [ 3291.419407] batadv_nc_mesh_free+0x41/0x120 [ 3291.423811] batadv_mesh_free+0x7d/0x170 [ 3291.427861] batadv_mesh_init+0x5b7/0x690 [ 3291.431998] batadv_softif_init_late+0xad7/0xd90 [ 3291.436746] ? batadv_get_strings+0x40/0x40 [ 3291.441060] ? batadv_get_strings+0x40/0x40 [ 3291.445372] register_netdevice+0x2dc/0x10f0 [ 3291.449785] ? unregister_netdev+0x20/0x20 [ 3291.454014] ? rtnl_create_link+0x145/0xa40 [ 3291.458327] rtnl_newlink+0x13b5/0x15c0 [ 3291.462305] ? rtnl_getlink+0x620/0x620 [ 3291.466277] ? mark_held_locks+0xf0/0xf0 [ 3291.470414] ? unwind_next_frame+0xeee/0x1400 [ 3291.474894] ? __save_stack_trace+0x72/0x190 [ 3291.479326] ? deref_stack_reg+0x134/0x1d0 [ 3291.483592] ? get_reg+0x176/0x1f0 [ 3291.487130] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 3291.493090] ? deref_stack_reg+0x1d0/0x1d0 [ 3291.497322] ? is_bpf_text_address+0xd5/0x1b0 [ 3291.501809] ? lock_downgrade+0x720/0x720 [ 3291.505943] ? lock_acquire+0x170/0x3c0 [ 3291.509902] ? __bpf_address_lookup+0x330/0x330 [ 3291.514561] ? check_preemption_disabled+0x41/0x280 [ 3291.519571] ? is_bpf_text_address+0xfc/0x1b0 [ 3291.524141] ? kernel_text_address+0xbd/0xf0 [ 3291.528688] ? __kernel_text_address+0x9/0x30 [ 3291.533186] ? unwind_get_return_address+0x51/0x90 [ 3291.538115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3291.543469] ? __save_stack_trace+0xaf/0x190 [ 3291.547954] ? __lock_acquire+0x6de/0x3ff0 [ 3291.552302] ? __kasan_slab_free+0x186/0x1f0 [ 3291.556714] ? kmem_cache_free+0x7f/0x260 [ 3291.560855] ? kfree_skbmem+0xc1/0x140 [ 3291.564725] ? consume_skb+0x120/0x3d0 [ 3291.568602] ? mark_held_locks+0xf0/0xf0 [ 3291.572672] ? netlink_deliver_tap+0x8fb/0xb00 [ 3291.577249] ? netlink_unicast+0x545/0x690 [ 3291.581644] ? netlink_sendmsg+0x6c3/0xc50 [ 3291.585867] ? sock_sendmsg+0xc3/0x120 [ 3291.589838] ? ___sys_sendmsg+0x7bb/0x8e0 [ 3291.594068] ? __x64_sys_sendmsg+0x132/0x220 [ 3291.598460] ? do_syscall_64+0xf9/0x620 [ 3291.602423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3291.607802] ? mutex_trylock+0x1a0/0x1a0 [ 3291.611958] ? check_preemption_disabled+0x41/0x280 [ 3291.616975] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 3291.621386] ? rtnl_getlink+0x620/0x620 [ 3291.625350] rtnetlink_rcv_msg+0x453/0xb80 [ 3291.629588] ? rtnl_calcit.isra.0+0x430/0x430 [ 3291.634077] ? memcpy+0x35/0x50 [ 3291.637348] ? netdev_pick_tx+0x2f0/0x2f0 [ 3291.641623] ? __copy_skb_header+0x414/0x500 [ 3291.646026] ? kfree_skbmem+0x140/0x140 [ 3291.650108] netlink_rcv_skb+0x160/0x440 [ 3291.654191] ? rtnl_calcit.isra.0+0x430/0x430 [ 3291.658872] ? netlink_ack+0xae0/0xae0 [ 3291.662936] netlink_unicast+0x4d5/0x690 [ 3291.666996] ? netlink_sendskb+0x110/0x110 [ 3291.671310] ? _copy_from_iter_full+0x229/0x7c0 [ 3291.675969] ? __phys_addr_symbol+0x2c/0x70 [ 3291.680296] ? __check_object_size+0x17b/0x3e0 [ 3291.684871] netlink_sendmsg+0x6c3/0xc50 [ 3291.688924] ? aa_af_perm+0x230/0x230 [ 3291.692884] ? nlmsg_notify+0x1f0/0x1f0 [ 3291.696865] ? kernel_recvmsg+0x220/0x220 [ 3291.701069] ? nlmsg_notify+0x1f0/0x1f0 [ 3291.705039] sock_sendmsg+0xc3/0x120 [ 3291.708747] ___sys_sendmsg+0x7bb/0x8e0 [ 3291.712721] ? copy_msghdr_from_user+0x440/0x440 [ 3291.717562] ? __fget+0x32f/0x510 [ 3291.721006] ? lock_downgrade+0x720/0x720 [ 3291.725145] ? check_preemption_disabled+0x41/0x280 [ 3291.730156] ? check_preemption_disabled+0x41/0x280 [ 3291.735169] ? __fget+0x356/0x510 [ 3291.738612] ? do_dup2+0x450/0x450 [ 3291.742141] ? __fd_install+0x1b4/0x610 [ 3291.746103] ? __fdget+0x1d0/0x230 [ 3291.749634] __x64_sys_sendmsg+0x132/0x220 [ 3291.753855] ? __sys_sendmsg+0x1b0/0x1b0 [ 3291.757904] ? __se_sys_futex+0x298/0x3b0 [ 3291.762049] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3291.767400] ? trace_hardirqs_off_caller+0x6e/0x210 [ 3291.772404] ? do_syscall_64+0x21/0x620 [ 3291.776375] do_syscall_64+0xf9/0x620 [ 3291.780166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3291.785344] RIP: 0033:0x7f829735b109 [ 3291.789133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3291.808831] RSP: 002b:00007f8295cd0168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3291.816889] RAX: ffffffffffffffda RBX: 00007f829746df60 RCX: 00007f829735b109 [ 3291.824154] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 3291.831415] RBP: 00007f82973b508d R08: 0000000000000000 R09: 0000000000000000 [ 3291.838673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3291.845933] R13: 00007ffc66b3dd5f R14: 00007f8295cd0300 R15: 0000000000022000 [ 3291.853965] Kernel Offset: disabled [ 3291.857594] Rebooting in 86400 seconds..