0, 0x5, 0x8000, 0x6, 0x6, 0x6, 0xfffffffffffff800, 0x1, 0x6, 0x80, 0x7f, 0x0, 0x0, 0x8, 0x2, 0x5, 0xfffffffffffffffc, 0x3, 0x8, 0x10001, 0x200, 0x800, 0x7, 0x6ed, 0x5, 0xffffffffffffff73, 0xa0000000000000, 0x6, 0x109, 0x6000000000000000, 0x2, 0x7, 0x0, 0xc3, 0xfff, 0x12d4, 0x4, 0x4, 0x0, 0x1000, 0x5, 0x80000000, 0x303b, 0x9, 0x2c67c9ff, 0x40, 0x2, 0x7, 0x260001f1, 0x9, 0x3f, 0x0, 0x3c, 0x0, 0xff, 0x4, 0x8, 0x5, 0x5, 0x1, 0xffff, 0x9, 0x0, 0x4e4, 0x9, 0x6, 0x3f, 0x1, 0x9, 0xc50a, 0xa54, 0x401, 0xac5, 0x863, 0x6, 0x100, 0x1, 0x2, 0xfffffffffffffbff, 0x8, 0xee96, 0x5, 0x3, 0x100, 0x10001, 0x8, 0x67, 0x80000000, 0x10000, 0x8001, 0x8000, 0x8, 0x6a6, 0x4, 0x1, 0x7ff, 0x473, 0x9, 0x3, 0x10000, 0x2, 0x1, 0x0, 0x5, 0x3, 0x8e, 0x7fffffff, 0x0, 0x2, 0x0, 0x4, 0xfffffffffffff800, 0x7fff, 0x5, 0x3, 0x400, 0x7, 0x0, 0x401, 0x2, 0x660, 0x80000000], "18ade92e1ef04327aea2e77baf6d68559cdc211096b2b25ad782e5baf08acf8d3188ea9d64da0022c19acf2742a1cef694b7a3"}}) ioctl$KDSETLED(r0, 0x4b32, 0x2) listxattr(&(0x7f0000005280)='./file0\x00', &(0x7f00000052c0)=""/224, 0xe0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000053c0)) bind$bt_l2cap(r0, &(0x7f0000005400)={0x1f, 0x4, {0x2, 0x1, 0x9, 0x1, 0xffff, 0x3}, 0x7, 0x6}, 0xe) inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000005440)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000005480)={r4, 0x1000, "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"}, &(0x7f00000064c0)=0x1008) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000006500)={0x1, {}, 0x1}) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000006580)={0x4, &(0x7f0000006540)=[{0x6, 0x8}, {0x4009, 0x10001}, {0x7fffffff, 0x1}, {0x9, 0x4}]}) 15:47:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:24 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10100, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x4, 0x5}) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) ioctl$TIOCCONS(r1, 0x541d) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x81) dup2(r0, r2) 15:47:24 executing program 5: r0 = socket$inet6(0xa, 0x800000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000080)="f8f68dc8a6d24917b8e59c81d5c0c31c0ada68970a47da90330dfce8b958266b50ae1a6ad519b9b2fdf854e923d248d3c753ee73a1d34411f9d0b5351313d693930f888da5ea113d192019f45e4098349ed31ae41d8704c9430b253933c1370da2828bc7b4efc0a3575c") ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0xf82000)=nil, 0xf82000, 0x80000003, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000ceaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000040)) 15:47:25 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x64000400) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x5, 0x8, 0x6, 0x20, 0x3}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0), 0x10) [ 144.012322] IPVS: ftp: loaded support on port[0] = 21 [ 144.037750] IPVS: ftp: loaded support on port[0] = 21 15:47:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x7, {0x2, 0x4e21, @loopback=0x7f000001}, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e21, @loopback=0x7f000001}, 0x2, 0x4, 0x7f, 0xffff, 0x5, &(0x7f0000000180)='syzkaller0\x00', 0x8}) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x600000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x4, 0x3, {0xa, 0x4e22, 0x81, @remote={0xfe, 0x80, [], 0xbb}, 0x80000000}}}, 0x3a) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8980, 0x14000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000240)={0xb2, ""/178}) dup2(r0, 0xffffffffffffffff) 15:47:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = eventfd2(0x0, 0x0) write$eventfd(r1, &(0x7f0000000000)=0xffffffffdbfffffd, 0x8) writev(r1, &(0x7f0000002700)=[{&(0x7f0000000080)="5565759488b04392", 0x8}], 0x1) clone(0xfffffffffffffffe, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)) readv(r1, &(0x7f0000000040)=[{&(0x7f0000002f94)=""/108, 0x6c}], 0x1000000000000248) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xdc6, 0x10000) accept4$bt_l2cap(r2, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x80000) 15:47:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000940)=0x14) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @loopback=0x7f000001}, 0x3, 0x2, 0x3, 0x4}}, 0x26) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000980)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xb}}, 0x15, r3}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x9, 0xa0}, 0x98) 15:47:25 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f0000000500), 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$TCXONC(r1, 0x540a, 0x2) write$P9_RREADDIR(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="49000000290114e435519b24bdc0e22e17d957007f0000000000000000060000000000000009000000000000000107002e2f66696c653043000000000300000000000000cb36000000"], 0x49) tkill(r0, 0x1000000000016) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x200840) 15:47:25 executing program 3: pause() r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x800, 0x202) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xa80}, 0x4) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000080)={0x20a, 0xbc}) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x64, 0x9, 0xaacf, 0x100, 0x0, 0x261, 0x1021, 0x4, 0x9, 0x40, 0x2, 0x5, 0x5, 0x8, 0x6, 0x9, 0x5, 0xbc3, 0x5, 0x1, 0xfffffffffffffff7, 0x2, 0x400, 0x1b, 0x79dca573, 0x8, 0x33d, 0x10000, 0x80000001, 0x4, 0x3, 0x80000001, 0x131, 0xff, 0x7, 0x7, 0x0, 0x8bc, 0x7, @perf_bp={&(0x7f00000000c0), 0x1}, 0x18020, 0x7, 0x7, 0x7, 0x5, 0x7f, 0x100}, r0, 0x9, r0, 0xa) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xf62, 0x40) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000001c0)={{0xfffffffeffffffff}, {0x1ff, 0x9}, 0x1, 0x7, 0x5}) prctl$getname(0x10, &(0x7f0000000240)=""/212) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000340)={0x100000001, 0x80000001, 0x1, 0xffff, 0xe0a, 0x7, 0xd8a, 0x1b4a, 0x7fff, 0x3fa, 0x6, 0x6}) prctl$getname(0x10, &(0x7f0000000380)=""/217) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0xfffffffffffffffd) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000004c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000500)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x2}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000540)=0x3) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000580)={0x0, 0x3e, "9165ec040769ce229252cc181d148adf33e7d694750c5adc2aad4792521a40666d6dce25ac505389dbcbc6e31f784a8cccb6e667bae546b8bc16b350e66c"}, &(0x7f0000000600)=0x46) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000640)={r3, 0x1, 0xaf, "d0e7db9ed2ce1439a7c8c3640fedcc7d1f1a1e7cdbe508d46ec1eb513ef49393194c32d48fd341d0aee2fee8a8ae740c22c832b358fbe14b52aff6cdf7ec2867ae033e19d7460e333a54618e435a11b60c3929f8db831d918e75a95a4c9f23b9f3435c3cc732e06e175f463a480ae160beffbc3b5c5171e401dc625515d63139c973d259bf264d6716385085bc99a03a18b297252ea64a8db1004d8afaf66393be8b95f238a2b81d3dd2c11df709d8"}, 0xb7) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000700)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000780)={0x0, &(0x7f0000000740)}) syz_mount_image$minix(&(0x7f00000007c0)='minix\x00', &(0x7f0000000800)='./file0\x00', 0x6, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000840)="a5f794e6c53afe7120dc569ebbae826394fa74706c32f5fbc46bd8095c7aab1249ab2bdd53c72510baf0", 0x2a}, {&(0x7f0000000880)="353793b317f59025ac567249eff6ca15ffa92f7d891b31d630d0b79d201d45ce9562ba8bda1fbd24484383249b51ec6f6d1390074c3d7b3f1701feff619b8520ffe269bc832fa3c381151891fe61bd52ca494dc2bd75", 0x56}, {&(0x7f0000000900)="bb58d42ae5c4bd81c1d58accbab71d8ef0708da5eb4d4b146298cdb238c884", 0x1f, 0x1}, {&(0x7f0000000940)="8e899f1aa10df31244bdf174b15d48921ee384e9d27f96d6c397702088e7223f0542bda49e0b4b40126b398c5e1ed9f7d8ac7799479cefd66bf3a4ae07070e860bf80917d9f79490580916982362f4aa4b445753de77c538494981f91304e98533191317ac5a4d89904e80ba9cf19648eb91e7d0bb8a56f828159f711b2bdca676938df8787fd3297273d58ae47c7e40925b02ee32002c7e346e", 0x9a, 0x3}], 0x200004, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x1, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000b00)=""/93, 0x5d) clone(0x200000, &(0x7f0000000b80)="64e49128084122367a488b2e516b87bac8af7440465613688112", &(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)="f942207a19359e5c") ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000c80)={0x7fff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) mount$9p_fd(0x0, &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='9p\x00', 0x8, &(0x7f0000000d40)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000dc0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000d80)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000e00)={0xa, 0x4, 0xfa00, {r4}}, 0xc) getsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000e40), &(0x7f0000000e80)=0x4) 15:47:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 15:47:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000340)=0x296) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000100)="66f0003166b93002000066b80900000066ba000000000f300f1b8b83c10f4d0ef69bb800008ed0660f32660fde39c9baf80c66b80032518466efbafc0c66ed260f2342"}], 0xaaaabf8, 0x5d, &(0x7f00000001c0), 0x1000000000000098) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x8, 0x4, 0x401, 0x1db, 0x405761ec, 0x6, 0x8, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380)={r5, 0x8, 0x6, 0x100000001}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000400)=ANY=[@ANYRES32=r5, @ANYBLOB="0010620067315a6294cbfe36c910af9babe7f2368c5533dbae7b6c04d9f87f0bc97cce81b28780ecd522a5545356abb2bf0000ceefdd71f0a0383bdea35586d632430243c4ac4c673cf42003586e76e09c5a5621152282fc6a0c3514475d1d0bdced0b45b139ca"], 0x6a) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="12ed00677a00000000"]) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r5, 0x100, 0x3}, &(0x7f00000002c0)=0xc) ioctl$KVM_RUN(r4, 0xae80, 0x0) 15:47:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) dup2(r1, r2) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) 15:47:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:26 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 145.031218] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. [ 145.077253] 9pnet: Insufficient options for proto=fd 15:47:26 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000480500000000000028010000280100006803000068030000780400007804000078040000780400007804000004000000", @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80028010000000000000000000000000000000000000000000000006000484d41524b00000000000000000000000000000000000000000000000000fe80000000000000000000000000001fffffff00ffffffffffffffffff0000004e234e214e224e2208000000090000009b000000ff0f0000960000000000000000000000000000000000000000000000ff010000000000000000000000000001ff000000ffffffffff00000000000000ffffffff00000000000000ff000000ff7465616d5f736c6176655f300000000076657468310000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008400fc0004000000000000000000000000000000180240020000000000000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002736974300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000ff0100000000000000000000edd4000001800000080000002a06000060c80000010000000000000028004e46515545554500000000000000000000000000000000000000000000010900ff0f00000000ff02000000000000000000000000000100000000000000000000ffffac1414bbff000000ffffffff00000000ff000000ff000000ffffffff000000ff16812d5d73797a6b616c6c65723000000000000062707130000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000003300030440000000000000000000000000000000c8001001000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000900000073797a31000000000000000000000000000000000000000000000000e1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5a8) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000600)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x0, 0x0, 'vcan0\x00', 'bridge0\x00', 'sit0\x00', 'team0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x1d8, 0x1d8, 0x210, [@comment={'comment\x00', 0x100}, @statistic={'statistic\x00', 0x18}]}}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0xffffffffffffffff}}}}, {{{0x1b, 0x0, 0x0, 'team_slave_1\x00', 'irlan0\x00', 'irlan0\x00', 'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2}, [], @random="f646793b7b39", [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}]}]}, 0x3c0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x100, 0x4) 15:47:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) process_vm_writev(r1, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/134, 0x86}, {&(0x7f0000000180)=""/145, 0x91}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f00000002c0)=""/126, 0x7e}], 0x5, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/252, 0xfc}, {&(0x7f00000004c0)=""/21, 0x15}, {&(0x7f0000000500)=""/215, 0xd7}], 0x3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) 15:47:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) getsockopt(r0, 0x6d7, 0x4, &(0x7f0000000100)=""/64, &(0x7f0000000140)=0x40) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000, 0x4000) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000000c0)=0x2e9f) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) 15:47:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:26 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f0000000500), 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$TCXONC(r1, 0x540a, 0x2) write$P9_RREADDIR(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="49000000290114e435519b24bdc0e22e17d957007f0000000000000000060000000000000009000000000000000107002e2f66696c653043000000000300000000000000cb36000000"], 0x49) tkill(r0, 0x1000000000016) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x200840) 15:47:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000100)='./file0/F.le0\x00', 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 145.257228] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. [ 145.271655] 9pnet: Insufficient options for proto=fd [ 145.310606] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 145.341057] FAT-fs (loop5): FAT read failed (blocknr 65) 15:47:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r1, r1) 15:47:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000780), 0x0, 0xffffffff, 0x10, 0x1300, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0xa0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x68e400, 0x62) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @rand_addr=0x9}, 0x3, 0x3, 0x1, 0x4}}, 0x2e) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x9) [ 145.366234] FAT-fs (loop5): FAT read failed (blocknr 65) 15:47:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x7a, 0xa, 0xff00}, [], {0x95}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000240)=""/195}, 0x48) getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000380)={@ipv4={[], [0xff, 0xff], @rand_addr=0x91}, 0x4c, r1}) 15:47:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x890, &(0x7f0000000140)={'trans=unix,', {[{@cache_mmap='cache=mmap', 0x2c}, {@access_client='access=client', 0x2c}]}}) dup2(r0, r1) [ 145.414079] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 145.420589] x_tables: eb_tables: arpreply target: used from hooks POSTROUTING, but only usable from PREROUTING 15:47:26 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 145.522341] x_tables: eb_tables: arpreply target: used from hooks POSTROUTING, but only usable from PREROUTING [ 145.562932] FAULT_INJECTION: forcing a failure. [ 145.562932] name failslab, interval 1, probability 0, space 0, times 1 [ 145.574373] CPU: 0 PID: 10132 Comm: syz-executor1 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 145.582793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.592160] Call Trace: [ 145.594770] dump_stack+0x1c9/0x2b4 [ 145.598431] ? dump_stack_print_info.cold.2+0x52/0x52 [ 145.603658] ? perf_trace_lock+0x49d/0x920 [ 145.607914] should_fail.cold.4+0xa/0x11 [ 145.611969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 145.617068] ? trace_hardirqs_on+0x10/0x10 [ 145.621319] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 145.626418] ? zap_class+0x740/0x740 [ 145.630129] ? memset+0x31/0x40 [ 145.633405] ? lock_acquire+0x1e4/0x540 [ 145.637372] ? fs_reclaim_acquire+0x20/0x20 [ 145.641687] ? lock_downgrade+0x8f0/0x8f0 [ 145.645830] ? check_same_owner+0x340/0x340 [ 145.650143] ? rcu_note_context_switch+0x730/0x730 [ 145.655063] ? lock_downgrade+0x8f0/0x8f0 [ 145.659212] __should_failslab+0x124/0x180 [ 145.663471] should_failslab+0x9/0x14 [ 145.667301] kmem_cache_alloc+0x2af/0x760 [ 145.671476] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 145.676501] ? vma_merge+0x4b2/0xfd0 [ 145.680226] ? lock_acquire+0x1e4/0x540 [ 145.684208] __split_vma+0x122/0x810 [ 145.687923] ? __vma_adjust+0x1840/0x1840 [ 145.692071] ? find_vma_prev+0x140/0x140 [ 145.696123] ? wait_for_completion+0x8d0/0x8d0 [ 145.700693] ? lock_release+0xa30/0xa30 [ 145.704667] ? rcu_note_context_switch+0x730/0x730 [ 145.709604] split_vma+0xa3/0xe0 [ 145.712963] mprotect_fixup+0x568/0x700 [ 145.716925] ? vmacache_update+0x10e/0x140 [ 145.721154] do_mprotect_pkey+0x5d2/0xa60 [ 145.725297] ? fput+0x130/0x1a0 [ 145.728568] ? mprotect_fixup+0x700/0x700 [ 145.732724] ? syscall_slow_exit_work+0x500/0x500 [ 145.737582] __x64_sys_mprotect+0x78/0xb0 [ 145.741723] do_syscall_64+0x1b9/0x820 [ 145.745596] ? finish_task_switch+0x1d3/0x870 [ 145.750080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 145.754999] ? syscall_return_slowpath+0x31d/0x5e0 [ 145.759925] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 145.764944] ? prepare_exit_to_usermode+0x291/0x3b0 [ 145.769959] ? perf_trace_sys_enter+0xb10/0xb10 [ 145.774643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 145.779513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.784718] RIP: 0033:0x455ab9 [ 145.787912] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:47:26 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:26 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)={[{@usrjquota_file='usrjquota=s/z', 0x2c}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) 15:47:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup2(r0, r1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r2, &(0x7f00000000c0)="f4df3bcfb4d330f706bca96f64c3b6bb35dfaeb49dca4cb0ba3dbfc14fc00cb99afe83a982d8b5b5506ce13e885f4f45a1e334015239a7b1bd12dfe9d93c3a13430e54afb9d938d47732278d6e0ed7bd726b7eaa7b72a0b8d72b66f699f1715fc2e3c9000bbb57b81e5bf6631e60e390e5385ae4abf8b08c653765039f983776bdfa149e19e560d9ad1c50aa1ffa0c13372833e68752ef8b0b768f2bb057fddb244dd900b5efe264ba466c138de476aa977dbd100f081f11553060d92767a269a65d1486012a42f8d571", &(0x7f00000001c0)=""/232}, 0x18) 15:47:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @multicast1=0xe0000001, 0x0, 0x100006, 'none\x00'}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000140)={0xfffffffffffffff8, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x7ff, 0x1ff, 0x9, 0xfff}, 0x14) sendto$inet6(r0, &(0x7f0000000000), 0x11, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 15:47:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl(r1, 0xb6, &(0x7f00000002c0)="c43b0f8cfec20f1f6e90a5e99fc6dbaf491c399e71c43a18ad65587aaff641a1a332292ac7d40a8b92a84f9e6799") write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x40000, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) 15:47:27 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x80000000, 0x5, &(0x7f0000002280)=[{&(0x7f00000000c0)="1325b6fdfe9f296f2c6dc9d8300d861af6de28f5b639d834e9e06bcd2cae83485448be91e46014d041ac7cf1edd709b843ca3359ac4d03c706b15fc906141f650b836ba61746a5bcedd6d51774", 0x4d, 0x5}, {&(0x7f0000000140)="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", 0x1000, 0xfffffffffffffffa}, {&(0x7f0000001140)="c29f86ed7e279e9f4c69d42f7ad273e933f8cf2e2b16bc8d3ec7a037d0edc6b4a9107d", 0x23}, {&(0x7f0000001180)="c6f9b16dec1ab2f38f806949d43e4320d92ab1fd02c5075b7927a4ee25414ed2d78994115511dd19fd675b4e5fa2d190d2284542596a731c84cda2c722e7fea6ac0bbf8280aac3ebe715850807eb4e368e09bf42bf67a87962abde10582b6e2ba8b7bcc5487f0c486c0719776e7dd58f4ec9ab12dcce39139267126a4b31f4550d2bebf3b54afd777c2799f39e48e3988716368d5e541bcebfcc90ecc1dff872028f0ead8c31b4946d03d11d8eab3df044cb0559a2477b50c535276d042dff0e67d9b2bade186edaa57c", 0xca, 0xdf3}, {&(0x7f0000001280)="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", 0x1000, 0xfffffffffffffff8}], 0x42002, &(0x7f0000002300)={[{@usrquota='usrquota', 0x2c}, {@conv='conv', 0x2c}, {@jqfmt_vfsv0='jqfmt=vfsv0', 0x2c}]}) setsockopt$sock_int(r1, 0x1, 0xd, &(0x7f0000002340)=0xffffffffffffff40, 0xffffffffffffff42) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr}, 0x10) [ 145.807489] RSP: 002b:00007fd603915c68 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 145.815228] RAX: ffffffffffffffda RBX: 00007fd6039166d4 RCX: 0000000000455ab9 [ 145.822524] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000000020000000 [ 145.829817] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 145.837104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 145.844398] R13: 00000000004c088c R14: 00000000004cff40 R15: 0000000000000000 [ 145.888304] REISERFS warning (device loop5): super-6513 reiserfs_parse_options: quotafile must be on filesystem root. [ 145.940379] REISERFS warning (device loop5): super-6513 reiserfs_parse_options: quotafile must be on filesystem root. 15:47:27 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x7, [0x5, 0x8, 0x40008000000, 0x5f, 0xa6, 0x8, 0x56acc296]}, &(0x7f0000000100)=0x12) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x208000, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) 15:47:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x6000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x20, 0x0) r3 = gettid() timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) close(r2) 15:47:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x480040, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000600)="240000001a0025f00485bc04fef7001c0a0b49ffed000000800008000800100001000000", 0x24) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$KDSETMODE(r3, 0x4b3a, 0x10000000000000) 15:47:27 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x400000, 0x0) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0x1000, @hyper}, 0xffffffffffffffe3) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/237, &(0x7f00000002c0)=0xed) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000440)=0x0) r5 = getuid() lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000640)=0xe8) getgroups(0x5, &(0x7f0000000680)=[0x0, 0x0, 0xee00, 0xffffffffffffffff, 0xee00]) r10 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @loopback}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) r12 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b80)={0x0}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000d00)=0xe8) fstat(r0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000dc0)=0x0) r17 = geteuid() getresgid(&(0x7f0000000e00)=0x0, &(0x7f0000000e40), &(0x7f0000000e80)) r19 = fcntl$getown(r2, 0x9) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000ec0)={0x0, 0x0}, &(0x7f0000000f00)=0xc) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001000)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001040)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001a80)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001ac0)={0x0, 0x0}, &(0x7f0000001b00)=0xc) fstat(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001f80)={0x0}, &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file1\x00', &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)=0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000002180)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000021c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000022c0)=0xe8) r33 = getgid() r34 = getpid() stat(&(0x7f0000002300)='./file0/file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002480)={0x0, 0x0}, &(0x7f00000024c0)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002500)={0x0, 0x0, 0x0}, &(0x7f0000002540)=0xc) sendmmsg$unix(r1, &(0x7f0000002640)=[{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="69e7304e480bed93fffdc540c16b559bf3e8ffa58805534f341356cd0f85f65659b2b5089acf828d99b0fbbce86a7fdb91a2d3037a8aa74adfa3ac", 0x3b}, {&(0x7f0000000380)="d89cd5226edbc3f88de03c87bbcf2ab2ff536a4a8fab1f2f433353c19e4a469abf68e7f6afa30867601fa5722ec24ded2bc5d2f77f998fcfb846a45f7bcba1023a80afb416bdd36d23d8195778adc54aebf0c28b4616d66a711adda3677910001bf1361fd803a312375b356c3555ff48a15ebaf5888f392dc5289b57f45e6f609e8c646ca409022fb0ceeb38d0dbc19e915de418fb2824332dc627bb1b14ab786ef95313776a36d1f55d8f36b2d13835626ba873a0", 0xb5}], 0x2, &(0x7f0000000800)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r3, r2]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x80, 0x20000000}, {&(0x7f0000000880)=@abs={0x7f450521757cd248, 0x0, 0x4e23}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000900)="b69e11076a7e560701afffc02d38bc4fa814d2820bce1eda649ece54618bdb4c8bdd38be177996e0a35564276725f9e69e7e8f09886a4b732274265e33bfe0f208d694a7942ea2bee7dd176dad2d74cfdf3183d01dcdaca706877dd89825", 0x5e}, {&(0x7f0000000980)="56f9bf4bf730eac76dbd5a6c376a4baf76fb89c721d6695e6382d6264732cbec34f5d76bd06e26ccf1ca0954c5f44328b2f90ae34d27cd789ae654660a49d2311f3497a4fdc3ed4f70a84dff909367c1c0d00adffd578843577aa265a1e8dfacd9dfc8df9a8abc5ff0a334ddde2a5f479f9e4cad64303c50214fa8a4673f04a3f709a95f02be829663e9aa2be00b1a9d682e805cc2de85549d97369098c67a244cb57cfa5256b23bffe21c2f6c772b7a0afe54e9a33fa1c5e2c5a78ca16abf781ed2c6d1d57519ad8583cd1188b44d7a97d278f826ff704584acbcc5460d9827a8eb6cbbce5b62ca0cb243dfa4d81f5bbda9d8cf2843e2b9", 0xf8}, {&(0x7f0000000a80)="4b3a45c685ed7da47c6ec0e058f3beddf1eef276c8e77167f9db3d2e4fc3ca10cf92c86cd7800575442b26dbcbf2ee9caf9b4ee28ac04aa35575f835dacad6f3fab922b12d130373979c40323fc9a1be19812d3205ed46cbad059d51d665baa67a425c20c91993f9056d4ba6cb2977814c5b8373e0795f8152e30f59afef1a2d039c4962b16e3cc77613afa9b0be1db0f6a183f9df1b9d046c67fc6332e68a9934f1ca08ee796486ae068cd0cf52b1356ef86c2aef44b46440072b", 0xbb}], 0x3, &(0x7f0000001200)=[@rights={0x20, 0x1, 0x1, [r2, r0, r1]}, @rights={0x28, 0x1, 0x1, [r1, r0, r0, r2, r3, r2]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x28, 0x1, 0x1, [r3, r2, r2, r3, r0, r3]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}], 0xf0, 0x4}, {&(0x7f0000001300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f0000001380)="0516a435881843221513b1aca7d040151cc12643b5052eab4da8938e4e5f146f37ec23523526a0ba2481c9918c8a646747abc33b7c224aa5711701eb562bfe5035a96a2aeab3a28ed798c58532caae496e66ab5d151426cc539a10e14bd6c8237d43da91e7c35800f2d7d98a7319f8eb504a0d78f85c51f2cd1fa79397eb9390097381a8e2193d4578d6f19512b02edc6bca61dda91d839617d65cbc20dfaa463833113d8fa386238ae0e3e757f541d44fb75482ee442caa11071de2327a3500c921fcfc558c4041609ebb07c84859263da24c10c51992a0d5f47d4450e9fb606b504d28f83b", 0xe6}, {&(0x7f0000001480)="aaf4a0bb7b8a923c6eae722c87556f7cf328a56e6c85ffb0c1f50596c2e19824420e89286f949dc3e0e054d2854ce354f2a7db1e8328d5b65a48e7010fa7f3cb5be9f675180faab8c4ade5582d00fc94b5dea47bbe9f8ed8ffe3ecf67b46c409bef34534f04371c9fe3b46bb014f6d49091af5e54f4c5da84fdbb252283e8ba819af1e83c1c536497660533341d7dd86038f203b3ce255c06264fab628b77a02", 0xa0}, {&(0x7f0000001540)="a3a173b28998fd716fe5dac8a4d67a6aa0fa838b15b58a725632adfbceb805104386ab64940f863f5e75a5eb61801eeaf4b540a4f9df7d977460b29069a8e96499657ebada4980b2817fd6b25bec52ea96cecd7633c7c53cc615f6c5fad863cb9a38a3e1a5341f522cb5b039a90c", 0x6e}, {&(0x7f00000015c0)="201cf2518461edb1fbf1776cbee9f86c9ba7859a874fd74831e4", 0x1a}, {&(0x7f0000001600)="742557958957eac35947e9f23528e17964128b295f9c71f9276b3526de5850fd0e09c73e45244aaba58903ae51814ceea8eaf55dc53bfccae4141cb44ddad0c296e3a0709af25f4d2a77e0a370cfd34472835cbac79cb58f617a69751f675757ead950ac3d6de3d6346d3699b38859e2920107cc20acc6a04a9c6c259f77d973", 0x80}, {&(0x7f0000001680)="1aea59f9cc7203be41679b5a987d577b6f3fefd3c432d5841b36cf6c46d3c8225215f18e5c7488115361d14638fdec5357f77568ce399049298a106cbd048336c890f83051124be4bc015a649813f8d4c2447fa87ffb529f92261a6f337a5b12afbf88ba174d27de67318fbb59375d33ecfb0278123425d3184234e936a416cff0164ece22ba9b5070d345877192c1d4c4129c519f44ea96ea3602fb4174193907096eaf866d5992bb834fd694ab9eb8fd68f9c0aedce7143875dad8d6bb6b9c139acb32c0fc7ba609224a0fbb69e6d9f129980a87fc100b573576f61bb799642b37d94bc48b45bbc25076", 0xeb}, {&(0x7f0000001780)="4b2345c34622567c8e8ef91b1cf2e0", 0xf}, {&(0x7f00000017c0)="7647dfab48de4c5478497f581c1bbd9e7c1bdf5f1e4a3d3e3c01f988229da906c6609564253e1f22da2460cd88f8aad27be1d17099b35492bdfe72a695131e1583f0e37733b14a23faf2ad2441392437066ca56b326b", 0x56}], 0x8, 0x0, 0x0, 0x40000}, {&(0x7f00000018c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001940)="e958c76b01326123f245341fac5cad1ec6a6", 0x12}, {&(0x7f0000001980)="bab77b1de1b0431d0b13a26b8da2e77a9f4cff348a7bcd88fc031b03f2521b39cd7e13be5ae069c7d30cafd3b04cf9c03c4d7c04a14212902ba179e4e83800103db7b5d21e84ec11333dd5c63367524494a56408af4251cc474b52ee3b079c902f8e3e6e7a8083cde144fafd8d5d577080c9248e8ad44a44ecf67ae2a1a8c62c1d54ea84086b6d01211791a76c9d3fcf31416ba4a5e744a9306995fecd32ecdd54811c8b79527d", 0xa7}], 0x2, &(0x7f0000001bc0)=[@rights={0x20, 0x1, 0x1, [r2, r3, r3, r3]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}], 0x40, 0x4000005}, {&(0x7f0000001c00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001f40)=[{&(0x7f0000001c80)="65ffdde799ecaff1867fb285b85ab22e3603340a18cc13e1559f9b332485761481a2a8a8bdb00eef0cde32930e0f7292497e7cad543d2c7cf960ebfdd615902cbbccdfd4e1c01c5d57eb2f31a141573e0260651a739ed6ee207f731b4ffc3c8d5c5a5fb70909aa73a391376d70a4b1d596962037075617fa1d9df65b64967b577e640b6898bb2534c2782e510452500bcc20c8b8782e31ff889ecc89b9d12efd3a5ab89d7eb1fd32783c72cbd552537ec91949e9365007824573fb3acd550670d7a74024d773b748dcee55c32d73452483d97aa8730d511b6174ad7a80b55af5a7c666133d5f9410af452b73da6f12b1655a0b18821b108a05b7456bf7f737", 0xff}, {&(0x7f0000001d80)="704ecbde3fbe346858b8299b02807449a33d19e99374d28e308679e64dbfd76d55250e2e799a9cdaff711715f5f610c8d63565a72f56a3022af4b684f187a54494a177a002616db51d98f16a7c81c3989fa78a1d36ed049384281aa4e0a4964037f417f785872fb68b81a57d72ef82c17c06bc6527d051a74b4ceee88e856118b4a233d973e4bae1973d435b9820f72507610e839bae784ffc46ad65c3ac317593f4d4674cdf7df949db1906be72710fca865a1762993632887a2981a870d86adb4d87befc836fd48a07a09fd60549c1a4ef8c76c5aebfe56d1de4029ceec6a751bb", 0xe2}, {&(0x7f0000001e80)="709baf73d1f4779f0e3f2e40ecb25d8e1f003cd7dc627f5e5f777d1e667b23aa2a88adcad4e987d79c9c1f498ba1b760dc0cf02145ac3a45277cd2f2e10bf3368efdccc8704c109c02aac0b23bd6c152c8f8d07b2a941ce3a405d48d515f355a3f558592f8db0c4241f5ab9f972961ddb94ffc88629ebb12c07be6c275864076cc2873834509e074560fdb9975410de40b67ddce51bfa52bf38770246924c46d7317dd", 0xa3}], 0x3, &(0x7f0000002580)=[@cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x10, 0x1, 0x1}, @cred={0x20, 0x1, 0x2, r34, r35, r36}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @rights={0x20, 0x1, 0x1, [r1, r0, r1, r0]}], 0xb0, 0xc051}], 0x5, 0x40090) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfd, 0x1000000}, 0xc) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000100)={0xc, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x3, 'none\x00', 0x2a, 0x4, 0x2b}, 0x2c) 15:47:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000b40)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x48}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000012c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="1bde", 0x2}], 0x1}}], 0x1, 0x0) r2 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)=0x0) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) fstat(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000200)="614d5fe3b1cb729641f76c567d13dc32b6a9fc55c5b39f080467e2f7a771e2be92e099e7af8a3d9154332d7d841471db7d564ae59c81bd33025660aa98fb07566f9aa51ead5f520fd093805c2e38065a4f304c98960f0c6b0639391461ef7bc99b783001119fb602f77d5312a970d76417bec1a2bed0b2ec2465def4996ecdfff60669b88d77ae8dd0b41fa242f571f0cdcf74a89d2f98c829698ed79074103a21ae08cb8f31b9877997cabc66bdaa598958811deee1da5eaa0bfe", 0xbb}, {&(0x7f0000000140)="bcfd77ec95650c427a0208811f6132df31699dae73f67bdc8f19828a80f9b769fb6a1f0cba634b0871b93c6bbbdf164d6121b3d514158f0781b3acebf904c034d4c54e13bc04f0df7500", 0x4a}, {&(0x7f00000002c0)="dcff5a3b3359a5cf37e0f2f23a5817805235867796073a734ede9b28df97bc9009312502cdaa1580caee3b6a3a52f28115d785d9acb8e13a3bdf755537e0946c8a6fcd96e6e0db78760cf5309ace15cfbdb5886f41710c5c3a9622a81d4f63ce1454b3efff0e7083faeda48d096568fd29ab717048107ec4", 0x78}, {&(0x7f0000000340)="ef2ee5797eec88332c49203a05decf7c2261d44001f6c79e2ce5e69f3eec8a3aca0e9af61987b3c9423fa757bda2af1f58a09aef88253360603b28cda8cecf6febc952de32658599b5e7aa7e92048e1187063fb99edc5a075d03e3a0d9dbf6d7764551e463fcad5d26c511a28499bba533e59bf520449afc7bdcb5dd697782443d4c9e717e04d3479041b9dfa0da3535984cbc39fd1171387c9b05775b31521de243cef190f97fd5946fc1e2fe81b47de7bc5a04780c7348965efc4a97c0bf235583410c92454351576104ed2c1263c666", 0xd1}, {&(0x7f0000000440)="dc7882cd", 0x4}, {&(0x7f0000000480)="f128a24129d759bdc1a3300f0d3b13329b4b7327b6588f5cd6482553cbb10bfc25d1bea1511ce29c2fcb9aba9c2ba63085e1238ed40ee06d70ec187cd54d33cb285077aaa084ee2a82b4e411957624cd65ec40ee6e3823d1d91b05fc53c0c72a31bb71f235d2b031f8579de70678450ad1128ce46790722ebb7b3f0297447a3323b5a974986d469fffb5cd8a53fcfd4a5375d36ea84f9f74a6dd190dcd8b85ed9ad54cc332a28634649e236eb80f566339870f66c2f99f331e26fd1c89027f914c3e31cc36404278134ec5ba1c72a317ae04a325ce27cdf9725d517c10f3373e8fdae0eeb8e4ff865876966f33ec", 0xee}, {&(0x7f0000000580)="f780b020abd64e2bd636eef88b4a04862c265200e81654a5db04555454812732224bce71790aca4cf719bab16143c28ac9a386e77694f3b83c6d04b65dfcd60ec9cfe63f6c3f574cd781bd1ccf73b180dc3ec25ec9b48436a550818506441acab2082bef21ac7a1ec450cab3ce4bfe930ed6f89d28055bccee287fd411a773b62a402bf5ec23773e3a5dc09b10b2eab552e19151e0", 0x95}, {&(0x7f0000000640)="a11335fa2b8bcb70c3545eba88431590a8733fb6c351f228e331f2b3bff9e21aae0f9cf7a0c196cdc595f292ee7252fb27cf542748a21870928b062fde3632e46886fc5962a223b8673ccbd1365b48c748b7cdeda11524d0a6fa4fde7e1ca69e134a56c14e296e19fc50315f7aa95d18e5214e96da093067664bd4ea27a2f0", 0x7f}], 0x8, &(0x7f0000000ac0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x40, 0x240000d1}, 0x840) socket$key(0xf, 0x3, 0x2) 15:47:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 146.327994] FAULT_INJECTION: forcing a failure. [ 146.327994] name failslab, interval 1, probability 0, space 0, times 0 [ 146.339415] CPU: 1 PID: 10186 Comm: syz-executor1 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 146.347828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.357192] Call Trace: [ 146.359783] dump_stack+0x1c9/0x2b4 [ 146.363415] ? dump_stack_print_info.cold.2+0x52/0x52 [ 146.366718] IPVS: set_ctl: invalid protocol: 12 172.20.20.187:20003 [ 146.368626] ? kasan_check_read+0x11/0x20 [ 146.368645] ? rcu_is_watching+0x8c/0x150 [ 146.368671] should_fail.cold.4+0xa/0x11 [ 146.387412] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 146.392526] ? kernel_text_address+0x79/0xf0 [ 146.396932] ? __kernel_text_address+0xd/0x40 [ 146.401418] ? unwind_get_return_address+0x61/0xa0 [ 146.406344] ? __save_stack_trace+0x8d/0xf0 [ 146.410661] ? save_stack+0xa9/0xd0 [ 146.414273] ? save_stack+0x43/0xd0 [ 146.417885] ? kasan_kmalloc+0xc4/0xe0 [ 146.421758] ? kasan_slab_alloc+0x12/0x20 [ 146.425893] ? kmem_cache_alloc+0x12e/0x760 [ 146.430198] ? __split_vma+0x122/0x810 [ 146.434069] ? split_vma+0xa3/0xe0 [ 146.437592] ? mprotect_fixup+0x568/0x700 [ 146.441726] ? do_mprotect_pkey+0x5d2/0xa60 [ 146.446032] ? __x64_sys_mprotect+0x78/0xb0 [ 146.450339] ? do_syscall_64+0x1b9/0x820 [ 146.454390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.459746] ? lock_acquire+0x1e4/0x540 [ 146.463710] ? lock_downgrade+0x8f0/0x8f0 [ 146.467844] ? lock_release+0xa30/0xa30 [ 146.471803] ? memcg_kmem_get_cache+0x3a9/0x9d0 [ 146.476459] __should_failslab+0x124/0x180 [ 146.480683] should_failslab+0x9/0x14 [ 146.484473] kmem_cache_alloc+0x47/0x760 [ 146.488521] ? percpu_ref_put_many+0x131/0x240 [ 146.493094] anon_vma_clone+0x140/0x740 [ 146.497058] ? unlink_anon_vmas+0xa60/0xa60 [ 146.501367] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 146.506388] ? vma_merge+0x4b2/0xfd0 [ 146.510103] ? lock_acquire+0x1e4/0x540 [ 146.514076] __split_vma+0x319/0x810 [ 146.517774] ? __vma_adjust+0x1840/0x1840 [ 146.521908] ? find_vma_prev+0x140/0x140 [ 146.525956] ? wait_for_completion+0x8d0/0x8d0 [ 146.530522] ? rcu_note_context_switch+0x730/0x730 [ 146.535438] split_vma+0xa3/0xe0 [ 146.538795] mprotect_fixup+0x568/0x700 [ 146.542756] ? vmacache_update+0x10e/0x140 [ 146.546980] do_mprotect_pkey+0x5d2/0xa60 [ 146.551126] ? fput+0x130/0x1a0 [ 146.554395] ? mprotect_fixup+0x700/0x700 [ 146.558533] ? syscall_slow_exit_work+0x500/0x500 [ 146.563363] __x64_sys_mprotect+0x78/0xb0 [ 146.567501] do_syscall_64+0x1b9/0x820 [ 146.571374] ? finish_task_switch+0x1d3/0x870 [ 146.575855] ? syscall_return_slowpath+0x5e0/0x5e0 [ 146.580770] ? syscall_return_slowpath+0x31d/0x5e0 [ 146.585689] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 146.590695] ? prepare_exit_to_usermode+0x291/0x3b0 [ 146.595704] ? perf_trace_sys_enter+0xb10/0xb10 [ 146.600363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 146.605198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.610371] RIP: 0033:0x455ab9 [ 146.613542] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.632745] RSP: 002b:00007fd603915c68 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 146.640439] RAX: ffffffffffffffda RBX: 00007fd6039166d4 RCX: 0000000000455ab9 [ 146.647697] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000000020000000 [ 146.654953] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 146.662206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 146.669459] R13: 00000000004c088c R14: 00000000004cff40 R15: 0000000000000001 15:47:27 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) socketpair$inet(0x2, 0x80004, 0x7, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000001c0)={0x14, 0x8b4, 0x100, 0x80000000, 0x3, 0x7, 0x5, 0x4, 0x2, 0x2, 0x4}, 0xb) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r3 = syz_open_dev$sndpcmc(&(0x7f00000007c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000800)={0x1}, 0x4) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0x7, 0x800d, 0x6, 0x2, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={r5, 0x0, 0x6, 0x37b, 0x2, 0x94ad}, &(0x7f0000000140)=0x14) dup2(r0, r1) 15:47:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="aa349ac7d52755f85494ca244ce02f6a", 0x10}], 0x1, &(0x7f0000001380)}, 0x0) 15:47:27 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000010000000000000018000000ff"]) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000140)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x4000000, @empty, 0x7fff}, 0x1c) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x487]}) 15:47:28 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x7ffe, 0x0) 15:47:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000400)={'ipddp0\x00', 0x1}) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x709000) [ 146.958465] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 147.017086] Dev loop0: unable to read RDB block 1 [ 147.022115] loop0: AHDI p2 p4 [ 147.025357] loop0: partition table partially beyond EOD, truncated [ 147.031867] loop0: p2 start 2020327233 is beyond EOD, truncated [ 147.070658] Dev loop0: unable to read RDB block 1 [ 147.075633] loop0: AHDI p2 p4 [ 147.078898] loop0: partition table partially beyond EOD, truncated [ 147.085691] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800004, 0x0) 15:47:28 executing program 6: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 15:47:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffa) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)="000000800000800000") openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ipddp0\x00'}}, 0x1e) 15:47:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/4096, 0x54c, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x8) 15:47:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'syz_tun\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) r1 = socket$inet6(0xa, 0x1000000000000, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback=0x7f000001}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8c00, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000200)=0x5) r3 = semget$private(0x0, 0x3, 0x180) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000100)=""/214) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8400, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 15:47:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) r1 = socket$rds(0x15, 0x5, 0x0) bind(r1, &(0x7f00000001c0)=@rc={0x1f}, 0x10) 15:47:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000400)={'ipddp0\x00', 0x1}) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x709000) 15:47:28 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0x8, 0x0, 0x4, 0x9, 0x100, 0x3ff}, 0x6}, 0xa) 15:47:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x80000a, 0x0) 15:47:28 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000f8f000), 0x0) dup(r0) 15:47:28 executing program 2: r0 = socket(0x1e, 0x1, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "0100000000000000000300004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) getpeername$packet(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000540)=0x14) bind(r0, &(0x7f0000000580)=@ll={0x11, 0x0, r1, 0x1, 0x1c7, 0x6}, 0x80) 15:47:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x28001) r1 = epoll_create(0x5) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000000c0)={[0x4004, 0x1f002, 0x2002], 0xfffffffffffffffc, 0xd1, 0x10001}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x321000, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0)={0x9, 0x6, 0x242, 0x3}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x4c, 0x2}, {}], 0x30) 15:47:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20}, 0x2, 0x1, 0x1}}, 0x26) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$KVM_SMI(r2, 0xaeb7) 15:47:28 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000100)={0x1, r1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 15:47:28 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000200)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8800, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000140)=""/74, 0x4a}, &(0x7f00000000c0), 0x40}, 0x20) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001c00)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000001e40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001f40)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001fc0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002000)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000002100)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000002580)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000002540)={&(0x7f0000002140)={0x3d0, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x8, 0x20, 0x0, 0x9}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x244, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x435}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x604}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}]}}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x44000}, 0x805) timerfd_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}}, &(0x7f0000000000)) 15:47:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800a00, 0x0) [ 147.655711] Dev loop0: unable to read RDB block 1 [ 147.660703] loop0: AHDI p2 p4 [ 147.663920] loop0: partition table partially beyond EOD, truncated 15:47:28 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_dccp_int(r1, 0x21, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000003ff6)="73797a6b06006c657200", 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000180)) 15:47:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) socketpair(0x4, 0x5, 0x3df, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000000c0)=""/4096) io_setup(0x6, &(0x7f00000010c0)=0x0) io_cancel(r3, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000001100)="211da4a98687746bad285597929369bf2c4247d1bfaaa61a6c5155e1ea46e3fd7cf69fcf08d8d145f8525057cda8653cd7b3d9f08b0b97c10dbde79773495c", 0x3f, 0x1, 0x0, 0x0, r2}, &(0x7f0000001180)) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) [ 147.704381] QAT: Invalid ioctl [ 147.715201] loop0: p2 start 2020327233 is beyond EOD, truncated [ 147.718639] QAT: Invalid ioctl [ 147.766834] QAT: Invalid ioctl [ 147.780369] QAT: Invalid ioctl 15:47:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000400)={'ipddp0\x00', 0x1}) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x709000) [ 147.885267] Dev loop0: unable to read RDB block 1 [ 147.890227] loop0: AHDI p2 p4 [ 147.893441] loop0: partition table partially beyond EOD, truncated [ 147.900352] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x400800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x5000aea5, &(0x7f0000000180)={"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"}) 15:47:29 executing program 5: r0 = socket(0x10, 0x4000000000000002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000400)={'team_slave_1\x00', 0x1000}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)) 15:47:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x804000, 0x0) 15:47:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:29 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:29 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) accept4(r0, &(0x7f0000000140)=@alg, &(0x7f00000000c0)=0x80, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)='\x00', 0xffffffffffffffff) keyctl$reject(0x13, r1, 0x1, 0x1ff, r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r4 = socket$inet6(0xa, 0x8080f, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r5 = socket(0x0, 0x7, 0x1) setresuid(0x0, 0x0, 0x0) recvmsg(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/145, 0x91}], 0x1, &(0x7f0000000300)=""/13, 0xd, 0x6}, 0x22) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x400, 0x2, [0xffffffff, 0x3]}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6, 0x9}, 0x8) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x1, 0x4) 15:47:29 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000001c0)={"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"}) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x0, 0x2, {0xa, 0x4e20, 0x502, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x6}}}, 0x31) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000005c0)={0x6, &(0x7f0000000140)=[{0x2, 0x5, 0x9, 0xedb}, {0xdfc68b7000000000, 0x401}, {0x100000001, 0x80000000, 0x4b5b, 0x2}, {0x7, 0x0, 0x23, 0x10000}, {0x8, 0x1, 0x80, 0x29ef}, {0x6, 0x5, 0x2}]}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000000c0)=0x39) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x5, 0xcca, 0x80003ce79159, 0x3, 0x7f}, 0x378) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000000)=0x1, 0x4) dup2(r0, r1) 15:47:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000400)={'ipddp0\x00', 0x1}) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x709000) 15:47:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000031c0)=[{{&(0x7f0000000140)=@can={0x1d}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)="1436430d48d97d3a32f6d8a3b38a641d2645315dde43a6bd599b18781b751695b1a8e759c119cf225c14fa707eba93bedb51b627eabdca612b07844042", 0x3d}], 0x1, &(0x7f0000003640)=ANY=[]}}], 0x1, 0x48015) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040), 0x100000000000005f, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x3) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000200)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x115, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/112, 0x3c}], 0x1, &(0x7f0000003500)=""/106, 0x6a}, 0x0) 15:47:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x2, &(0x7f00000004c0)=@raw=[@initr0={0x18}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x21, &(0x7f0000000580)=""/33}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xea, 0x1000, &(0x7f0000000000)="6093a1ee5b3bad21412331c1c7653ef54b64278371d9fd6c7895c3ee27cf1dda68a3acc7dabf7526908f5f6b6c65bba76875670c2c9b5aec9b7ad426a8af19fdb33b8ab6bb33127d4dba6a127ddc9e4d63a7f839d6ca53eb1635f68b91d51d857a2f5557c1c5c35f92c762557ca7c11bb26c473d66697543e96f9d9e18cad9475c2a6c686e284ebb691b9728c7f1e8d17838bfae5ad43919e4f74c410fb1b814928949a240bb2a0887500463270b1e973809cd65c80f082653e8a21c48eaaaf2d53feb40acfbd1eb3962be5140084cdfaa9d75233669cbcfee4b75d5def089bc17e0aa3bd76d847e354a", &(0x7f00000005c0)=""/4096, 0x81}, 0x28) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x4, &(0x7f0000000500)=[{&(0x7f0000000280)="a6648b68e4185762d1aa8d5f675af21fa71e3a71e005aaa92e1a290761aeb2a0f254a8344634c14d90dcc9e442ab0f9efba558db1cc5a4d9b62dba8f29c064c6996ca745b805809c22bd83b94a651a875ea0e3d60390e884b2c770a87128a9e704000300709bb6970b8cf99baa843c66eefec088594ca0e24cff30d8f8f2e4b8f4df6e0469bf9a82dd8529f47fd9923580cf1527de4f45aa7b3cca51099c8abd89192f96c9346b33ce0a1304b5479f7c9eec9582a572c312f9c2fffb0015d3e950637705c08884fcb699926fc7956ec7d423280da0abe06c93699dcf04c21a35ec939bc98c76dfd9a186ad694854b1f476", 0xf1, 0xffff}, {&(0x7f0000000380)="5700821ef355c512f6f085d21ddb33407b3266aee5a7f4f88a2c4d8c680cd7cf0cd84d468a9b973793b5a91b41a58d6f2c0bd024b88bcf8633be4cd62dfbbfd2e71d67f6b1cf2b6cb92c2697370a943e1abb943e857536638efec4754b8204e1df0b6e19de0609e3994d041827c1a94b180666f3d64f2c59ddfe7079065fa5bfdaaad3034d300441ad74e719e8ab0c4fb2bad7416e5af1e58f395ba0e394c12b8d9e27a8bb6448f1b4e2927498ba572757da18", 0xb3, 0x81}, {&(0x7f0000000440)="acfe2bf7c5a427997ee49cf63d63aff4156cd4188ea1841aad6c5d", 0x1b}, {&(0x7f00000015c0)="302523158173d9ccf202d636fd71e476bc42083384526e473c81c98fc1cdb5ad84c220e9533fc2fcd19e5334316f3b0206c2abcfbf7698bb28c0ba8e22ff17d8bbc0f77b2a25243bedd0e7a0f35c1786ee265d17d759b8f8e400bfcda15f859866b67b6c5fb6c8e70462c6a7f4b73d81218802741a90502eec51e5faf96f960e0162ed7c4340e03bb2761b9aeef6e3ddcdad53ae6e3e73c80cfdae271d0b2d0ac2d1efc3751f6814a6774281021244a43b53ef8189beec7f13eb2caa9a8990adbdc2623a0a41e498a634f35d8cd4f2602080b67faf46e98cc343c2e9d48ae5235d1d6d1f98ff4c405e9999c49754dd", 0xef, 0x8}], 0x803800, &(0x7f0000000480)={[{@quiet='quiet', 0x2c}, {@dir_umask={'dir_umask', 0x3d, 0x5}, 0x2c}]}) 15:47:29 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 15:47:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800002, 0x0) [ 148.491630] Dev loop0: unable to read RDB block 1 [ 148.496600] loop0: AHDI p2 p4 [ 148.499869] loop0: partition table partially beyond EOD, truncated 15:47:29 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xf, 0x6, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x3, 0x7, 0xe, 0x2, 0x40, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0x23}], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x18, &(0x7f0000000100)=""/24, 0x41f00, 0x1, [], 0x0, 0x9}, 0x48) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x800, @empty, 0x5}}, 0x1000, 0x7f0, 0x5, 0x0, 0x40}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x103) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r3 = dup2(r0, r1) write$P9_RREADDIR(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="c50000001291fc3d3374c6092902007f0000000802000000070000000000000002000000000000203d07002e2f66696c6530400100000007000000000000003f000000000000000307002e2f66696c65300404000800040000000000000002000000000000002007002e2f66696c6584000200000000ff07002e2f66696c653010040000000600000000000000fcffffffffffffff0407002e2f66696c6530a100000400040000000000000014000000000000000107002e2f66696c653097ebc7468c2745014801c0e7ff9166acf5b5f64c7911744e6bf57669ad30545fcf5172d609dfb41f03b7ec8efc6516d6cccebb1a2add8f73d9d248c2a137bcb8907fc71cd07bec61d394854db8cfdb6cf26d2175d8b67aa961d21e7e193ba9895d17ea2a25f11a205f19dd74a245a9feb24c13f9353ce1460943c3"], 0xc5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000500)={0x0, 0x2, 0x48000, 'queue1\x00', 0x7}) socket$l2tp(0x18, 0x1, 0x1) [ 148.551204] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:29 executing program 5: setgroups(0x0, &(0x7f0000000040)) getgroups(0x1, &(0x7f0000000000)=[0xee01]) r0 = gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x10000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000140)={r3, r4, 0x400}) 15:47:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) 15:47:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:29 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x328) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r3 = dup2(r0, r1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xc, "5ac251329e3f4178b3e26181"}, &(0x7f00000000c0)=0x14) write$P9_RCLUNK(r2, &(0x7f00000001c0)={0x7, 0x79, 0x2}, 0x7) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r4, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x8, 0x5}, 0x90) 15:47:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000400)={'ipddp0\x00', 0x1}) [ 148.792527] Dev loop0: unable to read RDB block 1 [ 148.797484] loop0: AHDI p2 p4 [ 148.800756] loop0: partition table partially beyond EOD, truncated [ 148.807274] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:30 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000200000000e668080600a4f98462af039343757a240000000000000004adbc2e094d61f2d19c6553e2709ce63d21886b1ffc8bddd9be6a8079d53b8a8ba671d8bbcf7dc383580e3a38ed35a1c295bdefc8d2de78d8c90374339928df74cdc4838c5a58ad2e3414132c01ea877c442082f292a04630b72654d2698f6d14ebe7d6713188535c161affc65155506c3d7494590c988ab9a916ae435a1916ab015d0c5d0ff97d17c7a4b0a1e3106da2ccb68878215e2031fdcbb4845e785a77e7a55bfefc34223279bcea5db8ebb8665c5094a747db9a3a5615d650d718fa2b3455fcc52b5aa56933bf89203911e53f889b66326368697f620c62fc", 0x113) 15:47:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0xb, 0x3}, 0x10) bind$rds(r1, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) mkdirat$cgroup(r1, &(0x7f0000000340)='syz0\x00', 0x1ff) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f00000000c0)=""/188, 0xbc, &(0x7f0000000180)=""/142}}, 0x68) 15:47:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xee0f0000000000) 15:47:30 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xe5, 0x200000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) pipe2(&(0x7f0000000080), 0x4800) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) r3 = dup2(r0, r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setresgid(r4, r5, r6) 15:47:30 executing program 3: r0 = socket$inet6(0xa, 0x80000, 0x101) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000003c0)=0x4) 15:47:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) r5 = shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) 15:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind(0xffffffffffffffff, &(0x7f0000557130)=@generic={0x0, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a53a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f1622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{}]}, 0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000040)={r2, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000100), 0x9, &(0x7f0000a82000/0x3000)=nil, 0x2) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={r2, @empty, @multicast1=0xe0000001}, 0xc) bind$xdp(r1, &(0x7f0000000240)={0x2c, 0x2, r2, 0x3b, r3}, 0x10) 15:47:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:30 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000140)={0x3f, @multicast1=0xe0000001, 0x4e21, 0x2, 'lblcr\x00', 0x4, 0x6, 0x65}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x3, @loopback={0x0, 0x1}, 0xfbd}, r3}}, 0xffffffffffffff1e) dup2(r0, r1) 15:47:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa00000000000000) 15:47:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000240)=0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000280)=0x80, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0x10f, {&(0x7f00000002c0), r3, 0x2}}, 0x18) [ 149.496567] Dev loop0: unable to read RDB block 1 [ 149.501543] loop0: AHDI p2 p4 [ 149.504834] loop0: partition table partially beyond EOD, truncated [ 149.511565] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:30 executing program 3: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, &(0x7f0000000200)=0x100) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000780)="67670f20978fa878c0c05fb9800000c00f3235001000000f300f0766baf80cb8c06b868bef66bafc0ced660fda8e01000080430fdc85f4bf0000b904080000b8842f0000ba000000000f30420f85231eeeb5470f35", 0x55}], 0x1, 0x0, &(0x7f0000000080), 0x0) getsockopt(r3, 0x4143, 0x1c, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x5000aea5, &(0x7f0000000140)) r4 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x2) r5 = mmap$binder(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000240)={0xc, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40086303, r5}], 0x1000, 0x0, &(0x7f0000000800)="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"}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000380)) 15:47:30 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6, 0x4e22, 0x2, 0x4e24, 0x0, 0xa, 0xa0, 0xa0, 0x3b, r1, r2}, {0xff, 0xffffffff, 0x0, 0xfff, 0xad9f, 0x18000000000000, 0x7, 0x7}, {0x7ff, 0x3ff, 0x4, 0x2}, 0x4, 0x6e6bbc, 0x0, 0x0, 0x3, 0x3}, {{@in=@loopback=0x7f000001, 0x4d2, 0x32}, 0x2, @in6=@loopback={0x0, 0x1}, 0x3501, 0x2, 0x3, 0x8, 0x2, 0x100000001, 0x4ce}}, 0xe8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) 15:47:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) shmget$private(0x0, 0x3000, 0x78000008, &(0x7f0000ffc000/0x3000)=nil) [ 149.680439] Dev loop0: unable to read RDB block 1 [ 149.685505] loop0: AHDI p2 p4 [ 149.688733] loop0: partition table partially beyond EOD, truncated [ 149.695925] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:31 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000a40)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f52a1cf0500000000000001000000000000010081000000"], 0x18) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000400)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) 15:47:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:31 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) get_thread_area(&(0x7f0000000000)={0x5, 0x0, 0xffffffffffffffff, 0x5, 0xfffffffffffff000, 0x80000001, 0x7fff, 0x3f, 0x10000, 0x3}) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x80, 0x3, 0x7}}, 0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x105000, 0x0) write$P9_RAUTH(r1, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x1, 0x3, 0x6}}, 0x14) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0xffffffffffffff94) ioctl$RTC_UIE_OFF(r2, 0x7004) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'syz_tun\x00', 0x400}) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x40) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000000c0)=0x3, 0x4) 15:47:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4000000) 15:47:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x5, 0x40, 0xfa00, {{0xa, 0x4e22}, {0xa}}}, 0xffffffb3) 15:47:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x40096102, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x5e7) 15:47:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80400, 0x0) 15:47:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 150.146389] QAT: failed to copy from user cfg_data. 15:47:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000300)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280), 0x1) write$cgroup_int(r2, &(0x7f0000000000)=0x8001, 0x12) 15:47:31 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000000)={0x55, 0x9, 0x7, {0x4, 0x412}, {0xffffffff80000000, 0x7fffffff}, @const={0x3, {0x8, 0x200, 0x32, 0x25391ffd}}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f00000000c0)) dup2(r0, r0) 15:47:31 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000100)=0xffffffffffffffff) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000140)="124ce09ba1d4d2d4f0215116d8d5864c04a3d79c2e2dba9b9e28fd790b4351427bad243af612d16f2c0f051ecdd2de3049860c518b32f267aefa47a74ff3554616a6f00128b5a94a146fc2d7e83968bb6427434006a02efe84539a77e1328033d4335e049f350436447a82843b608222c193f3aa8b57f77a725faae79dba196152a9450de0ddac6ec8dcf4d67ec6cca583b7b56545de45b65241632c9e1a4464b361e1940784d0162216ceeaa0e63286a504d1d4944142df26") poll(&(0x7f0000000000)=[{r1, 0x84ae}], 0x1, 0x0) close(r0) 15:47:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa00) [ 150.214237] QAT: Invalid ioctl [ 150.223009] Dev loop0: unable to read RDB block 1 [ 150.227944] loop0: AHDI p2 p4 [ 150.231151] loop0: partition table partially beyond EOD, truncated 15:47:31 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xe, 0x5, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) 15:47:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:31 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40200, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x2) r3 = syz_open_dev$sndpcmp(&(0x7f0000000640)='/dev/snd/pcmC#D#p\x00', 0x7, 0x288002) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000240)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/65, 0x41}, {&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/24, 0x18}], 0x4, &(0x7f0000000580)=""/3, 0x3, 0xfffffffffffffffe}, 0x2) renameat(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000180)={{0x2c, @empty, 0x4e22, 0x1, 'fo\x00', 0x35, 0x3, 0x71}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x6, 0x5, 0x5}}, 0x44) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000600)=0x4, 0x4) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000100)={0x2, 0x3}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000001100)=ANY=[]) recvfrom$inet(r4, &(0x7f00000006c0)=""/158, 0x9e, 0x40, &(0x7f0000000780)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000680)={0x7, 0x1c78a662}) bind$bt_sco(r4, &(0x7f0000000200)={0x1f, {0x1, 0x9, 0x4, 0x3, 0x20, 0xea}}, 0x8) dup2(r0, r1) [ 150.258666] QAT: failed to copy from user cfg_data. [ 150.265342] QAT: Invalid ioctl [ 150.269071] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:32 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000440)='xfs\x00', &(0x7f0000000480)='./file0\x00', 0x4, 0x8, &(0x7f0000000a00)=[{&(0x7f00000004c0), 0x0, 0x100000001}, {&(0x7f0000000500)="86760249fe27fc56a74c9af00621f3a88c2b18a0d717646636be0704797d3c4e6272db81a855e0c41a17fd", 0x2b, 0x7f}, {&(0x7f0000000540)="312761f9cd3395c9558cbe8e1034d1853999be84f21bd2f4fe6640d7e534f847e8a660b01d574eae3fb4ee58d565cbfa5ca8b30cd688b6a56ea8e3821383d16423d0bf5c229fc8f897d024c250b9281b2f823ae2821f56279b24a24244f7b4dde4c6e778e934266d742f0cdfff150d06e847ae296f7008a8e55a61c1812c5cc60fcfa4fa70912b74288af5f3af6c12ea885d4bbab5fc7f3c0439be0976e84372895bcf4d1af4d58e05f447669270020096f914836bf63b72e8169d83a0a646", 0xbf, 0xffffffffffff010e}, {&(0x7f0000000600)="b996b7568059045f66e29645a344a0a5e3722a22ab0f601265a3c7b0dc416128ab61490cc75110f0aa57ee73", 0x2c, 0x1}, {&(0x7f0000000640)="a28ee207aa58334768af80f5f90717f6fa213b4faee69289daa4aba7636a89c08234c447c34b135d10c7fa0f49a2f5efbe5129e14aa07f65906f8ec91ef7a775460f41cdd626cce0171c5cced0fd4db9266be1619196863d5df3e9e78d2d292a99bfeaafe9fd71e458419387c00fc86fb4f7baaefeecc74d7a0f2fe507699fe7a2359c62bf88ff4ca729df91a99a0211e2a0a5e6bd507d7f1d34a34df5b2e04b1617544971a7007597ac44a83a72305c3675d8ed48a38e531e14eaf71fb829347cd537d095fd", 0xc6, 0x5}, {&(0x7f0000000740)="1e8b73cd1f13a7088809c41fce630255ce81011a00bf3476547422435c221fc91e28b11ec6eed553e06f55652d61241c73928f7210e72f0f4d5f608ef9a0ecda54a04e766b2b9feedbab697d05bd3a420de6b16de7d8ee87f996b5d371f4d887fd8ff000c2cb33ec4419f25ff800cd1c03f22e21075f294045b0d73e6c95e80c056c591a50c7b896ae9b41e4", 0x8c, 0xfffffffffffffffe}, {&(0x7f0000000800)="a7785792435a5ec91b06b27fa8769d61fbb0d358a834dc1843d956a7d35fa543c1b69c9d1a5f1b4316fbbac31d3eddcf6be1ffdd4f6f9511b5f215d1c214bc1dd47605716443e0f04677b405c70f466b086746998e2cf3c7579c33d0e7eb7e6ae53a1b3cc06632d7b5c19244f7d61fce373a641ce6fa056e86ab4400984ea0b8d0932fe24b02f89aef93f6eef8497ded1404891d7f300971a27f615cded39511f4914f49a4a1fb632af333556c8206029273a6e14393b9569c00e1b7895df4469440a3229e5dabf3167b88e9f4d9", 0xce, 0xaab0}, {&(0x7f0000000900)="59171199bbf928b19b0f22de998f0ccacea05928797d4cfef5721850d3983324e5b7aff4ce3e9833fca833ce62eee1e2a9945e36e055f7edc9c9b3a6412aede8a4bfb259e312005ee330751a1bf44739280ad365f17655950212e07de8bbdf81d4858a83e114e653157a22cdb4763b7529d24fe3a2c06175433f576703fac91e4d39619c92f5397105c751f6828c9dd81f992fbb91f6b4ed1edcf4ca3aac2e7f52c4f1784b617606716dd6c7db6ff95215af8bd5aa3250b19a713816a09b8077b8243743e4aa29c9042b58d38e27317f094ec40a965004f2486a6a3d", 0xdc, 0x3f}], 0x880, &(0x7f0000000ac0)={[{@swidth={'swidth', 0x3d, 0x58b}, 0x2c}, {@qnoenforce='qnoenforce', 0x2c}, {@inode32='inode32', 0x2c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='efivarfs\x00', 0x41, &(0x7f0000000340)="bcec9caa0469c1145c46bf9b2c08a300b327e54e326664edd34039293f5cf22b70c3a10cd237399ce9fa97686bc3a308eef02d79ccddd0910a544f86b604d2a2c76a62a93fda72f50e40ac167fdb2979453ef4a443c5f3ce09b29d7d85e2bb4be62e290320ddff5cb5099f") mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x20, &(0x7f0000000440)) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 15:47:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x5, 0x4) 15:47:32 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f00000000c0)={0x0, 0xb000}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0x6, 0x6, 0x1c37, 0x4}) dup2(r0, r1) 15:47:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4000) 15:47:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg(r3, &(0x7f00000009c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x0, 0x2, 0x1, {0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x1ff}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="78b9056f8e3f1922ee9afcdca8ae201f1970bd9829ab40dbc5d1bcec2d097b157174be7498fccf0d58d8043e4086dc0257fd73e2b0ce8ed4e4dc96ca486202dec2717346bb55b83fb469fe2371d6a162608c252abca0d3972c4883661df22d7cd00afaa2704167f01fa2ef343951556ccf212aa5cf43bdd5da33e028778678402e17ea35d3d0d5fee56cc441f4446764e264ded5cadda58f13999ad20cf48a07ac0a38058adfcf1b11560b7a6a27", 0xae}, {&(0x7f0000000300)="92c4b44efda814b62f61205ae196b51c7a7fa5c6cb8cd62ff2e0f1da90edc16e02f7055c3327156b56e9a63a5a26b42e91662c4c953a7324b392243087898df8fe7fd0a3f667d76ff6fb085c8f2089393ca2a3c8270c6cf79cc5063f2538c8cce23420c3b38c15752ebf9407bf6705b70933284ec2260335e5601ef92bf7be90c3368e7ae366b746bae6ea165c45af9ca2b4b5ea73be697b8e8e923bd51264fea129cc2d0d6ffc16b9c682eb76db428d5dd7cc7d2cd569d3b5c5415b72f8619b789ad337fce5de1733a253531024d09720ba56ce0d7fedac9abddb4fcf3dc3fb8c17bb68955a8c5afc4911f983d10c8ed392b41ef19a22e8af", 0xf9}, {&(0x7f00000000c0)="98484b4372794d065edc29cf85b85f94", 0x10}], 0x3, &(0x7f0000000440)=[{0xa8, 0x1, 0x3f, "203c3eb8dc3ee7ff595da3075c55aa36f785ad1836c6c5647be7fd6ee25a25088ee67498b21d2d8312a76f825cc3cdb6430153b169f06f93eaea426f76c8fe925b5d7f123db93be85f4cee81596e728aa6b46c1f76ae1762b5d248afd9d2a2a082ce5523661042094d1f44a48315bcda0e8af2aa991bb58712461436d7d54f1f29c5854de15407c78d673483e278a6d05a4a0d7edf"}, {0x100, 0x111, 0x80000001, "b0b6a32b9997fa5bfe1b6ff5286db12ea471b26f65ee0dd210360e6b33cbf336ef38e194daec272895949c069d9c53d289318723b2d11b866dff5d76bd4e9a40c4fb6d82d025336c1af9bd70bec5314f31331a2d8a76c8147c74ef769f4419ee27a893cdb5b6adb804ecefe6f989c821c80065b53f557e1516449377d731548fa3bbc7a15d9e2ba8c959bcc84c87e939a228b9818d3c25da8d4aacf9612cdfde0c4f7bbdd92bea01579e383f188b7f2df47bb860a8f2d5b5670512b90e309e656a988efc0c381c1959bb2e7cd6ee3ef88a2809b0491a3ed3707a6bd9dff7396f6d33bb79332613b307e3"}, {0xa0, 0x10a, 0x2852, "446931305b8f4f6f4296618933b6a71ea310d86a4ce6819bc1aa45bd62939f4f048e266a321b2ca3968ec26ade66237fd0089eb0f2d2ea12ad1dda4e3ed98989c9dc4b7f10c40617e1601b6c5c3516d0bdaf392c6be6ba65540747e6e45e12b39143e777e9462798e715728e8c25eb1240ae4fabec5c7e5b4d917bfca4f2854dce725abbfd66e63563dfa45035"}, {0xa0, 0x117, 0xbf, "50d9b4b54b72692cff3b7e78ae626e6f99ecb2c001ccd1af9f2793a9892231b1983ea1b3dcfec10eac4c6e5404325f219f6a3334949f8ff12f130b0c6e0fb86795eb17b0c5c3d29d9701572910d6fcf6ccdfffc1bbce779d517bdffcc89dacad7d70c0e5256aa2bafe9e495260d39b42a0a39a435ecea952ed9057b28aca02d915f60381ffe1ce0ad4755987"}, {0x38, 0x100, 0x3, "73d6a99c23d2cbed47d806b221806d04f91bab91171dd588c7210a3b73a2273092e15116"}, {0x40, 0x111, 0x5, "6e9a4caef6f388644793999279a5150aaa73807b586db1adb3dc9f57f8563d58c7e1f47b33bd2277bdbbdf"}, {0xc0, 0x103, 0x9, "e3630f615899b9b9bf9467c702060e88bd0a8a486a786ca4504b47378570a6d547f9f8ef367494bea1cc06e04a7895e52b13170a49cd3c20d840d16f6892ac7913983c554d8efa81eaa0d0e973ea1ea50873a683e4a063470b51b2b90e64ef7b66f1bd1f7697c03599f598804ef8f3512b9c28d85ef47c8bbaccec7dbe5154a4119dd7896aec53c8361c5bfbeb50a45ebaf2a210c0ba696844ad85008e37fee8638fa4d65e315d81ac4699b0b13f"}, {0x88, 0x11e, 0x6, "e6ddfaa02b0dcfb274002772370c67256d94b7959a2025ba47626c5eb1f7ae6dd4b5a250f3cc990460ce947a1a2e3a4f5bc70d0720cb5cfcd717e6f8ccfa8ee4ffc3a54718fa04c6c127af8dcacafdd225d5b1e9601ae38a2fe220265fb19b19da01c3fd19d6cc38f637f52e25ddc0ab98322b95"}, {0x70, 0x10c, 0x1, "0c7bd4135b9306358ad6937bbf0366c72989b2533c7661eee07aec6d533abb34c45d608ef105dc763a29d1d920d055482db421bf06fe2c7790efb6e5696c81e40759224bb59a4d1fa79279bf45b1fb8fa614c95c80c97c806000f07ff1db"}, {0x58, 0x11, 0x8, "d372c6ff111f7822ff535c5e4bc460d496e9bbb9b4ad5a282a61ab07557e28dd0325f81357495792feb834cb036442e50b6dfcc761fb0d79ad0bbfb0f2853eed0db6"}], 0x570, 0x400c815}, 0x20000000) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000e00)=[@textreal={0x8, &(0x7f0000000100)="66b8000000800f23d80f21f86635400000d00f23f80f20d86635080000000f22d83e0f01c8d20d66b9910900000f320f35baf80c66b82a5d888766efbafc0cb816afef0fae830d5c0f060fc71e643d", 0x4f}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:47:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:32 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7428, 0x52100) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x18) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000100)=""/251) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r1, r2) 15:47:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000000) 15:47:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 151.032545] Dev loop0: unable to read RDB block 1 [ 151.037534] loop0: AHDI p2 p4 [ 151.040763] loop0: partition table partially beyond EOD, truncated 15:47:32 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getegid() r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000000)=""/51, 0x33, 0x2, &(0x7f00000000c0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) dup2(r0, r1) 15:47:32 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) recvmmsg(r1, &(0x7f0000000fc0)=[{{&(0x7f0000000080), 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000240)=""/75, 0x4b}], 0x2, &(0x7f0000000300)=""/47, 0x2f, 0xcb9}, 0x2}, {{&(0x7f0000000340)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/182, 0xb6}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/149, 0x95}, {&(0x7f0000000600)=""/170, 0xaa}, {&(0x7f00000006c0)=""/107, 0x6b}, {&(0x7f0000000740)=""/75, 0x4b}], 0x6, &(0x7f0000000840)=""/107, 0x6b, 0x1}, 0x37}, {{&(0x7f00000008c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000940)=""/253, 0xfd}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000b40)=""/137, 0x89}], 0x3, 0x0, 0x0, 0x7}, 0x9}, {{&(0x7f0000000c40)=@un=@abs, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000cc0)=""/188, 0xbc}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/12, 0xc}, {&(0x7f0000000e00)}, {&(0x7f0000000e40)=""/206, 0xce}], 0x5, 0x0, 0x0, 0x80000000}, 0x57fd}], 0x4, 0x41, &(0x7f00000010c0)) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20842, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu', 0x20}, {0x2d, 'pids', 0x20}, {0x2b, 'cpu', 0x20}]}, 0x10) listen(r0, 0x0) 15:47:32 executing program 4: mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg(r3, &(0x7f00000009c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x0, 0x2, 0x1, {0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x1ff}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="78b9056f8e3f1922ee9afcdca8ae201f1970bd9829ab40dbc5d1bcec2d097b157174be7498fccf0d58d8043e4086dc0257fd73e2b0ce8ed4e4dc96ca486202dec2717346bb55b83fb469fe2371d6a162608c252abca0d3972c4883661df22d7cd00afaa2704167f01fa2ef343951556ccf212aa5cf43bdd5da33e028778678402e17ea35d3d0d5fee56cc441f4446764e264ded5cadda58f13999ad20cf48a07ac0a38058adfcf1b11560b7a6a27", 0xae}, {&(0x7f0000000300)="92c4b44efda814b62f61205ae196b51c7a7fa5c6cb8cd62ff2e0f1da90edc16e02f7055c3327156b56e9a63a5a26b42e91662c4c953a7324b392243087898df8fe7fd0a3f667d76ff6fb085c8f2089393ca2a3c8270c6cf79cc5063f2538c8cce23420c3b38c15752ebf9407bf6705b70933284ec2260335e5601ef92bf7be90c3368e7ae366b746bae6ea165c45af9ca2b4b5ea73be697b8e8e923bd51264fea129cc2d0d6ffc16b9c682eb76db428d5dd7cc7d2cd569d3b5c5415b72f8619b789ad337fce5de1733a253531024d09720ba56ce0d7fedac9abddb4fcf3dc3fb8c17bb68955a8c5afc4911f983d10c8ed392b41ef19a22e8af", 0xf9}, {&(0x7f00000000c0)="98484b4372794d065edc29cf85b85f94", 0x10}], 0x3, &(0x7f0000000440)=[{0xa8, 0x1, 0x3f, "203c3eb8dc3ee7ff595da3075c55aa36f785ad1836c6c5647be7fd6ee25a25088ee67498b21d2d8312a76f825cc3cdb6430153b169f06f93eaea426f76c8fe925b5d7f123db93be85f4cee81596e728aa6b46c1f76ae1762b5d248afd9d2a2a082ce5523661042094d1f44a48315bcda0e8af2aa991bb58712461436d7d54f1f29c5854de15407c78d673483e278a6d05a4a0d7edf"}, {0x100, 0x111, 0x80000001, "b0b6a32b9997fa5bfe1b6ff5286db12ea471b26f65ee0dd210360e6b33cbf336ef38e194daec272895949c069d9c53d289318723b2d11b866dff5d76bd4e9a40c4fb6d82d025336c1af9bd70bec5314f31331a2d8a76c8147c74ef769f4419ee27a893cdb5b6adb804ecefe6f989c821c80065b53f557e1516449377d731548fa3bbc7a15d9e2ba8c959bcc84c87e939a228b9818d3c25da8d4aacf9612cdfde0c4f7bbdd92bea01579e383f188b7f2df47bb860a8f2d5b5670512b90e309e656a988efc0c381c1959bb2e7cd6ee3ef88a2809b0491a3ed3707a6bd9dff7396f6d33bb79332613b307e3"}, {0xa0, 0x10a, 0x2852, "446931305b8f4f6f4296618933b6a71ea310d86a4ce6819bc1aa45bd62939f4f048e266a321b2ca3968ec26ade66237fd0089eb0f2d2ea12ad1dda4e3ed98989c9dc4b7f10c40617e1601b6c5c3516d0bdaf392c6be6ba65540747e6e45e12b39143e777e9462798e715728e8c25eb1240ae4fabec5c7e5b4d917bfca4f2854dce725abbfd66e63563dfa45035"}, {0xa0, 0x117, 0xbf, "50d9b4b54b72692cff3b7e78ae626e6f99ecb2c001ccd1af9f2793a9892231b1983ea1b3dcfec10eac4c6e5404325f219f6a3334949f8ff12f130b0c6e0fb86795eb17b0c5c3d29d9701572910d6fcf6ccdfffc1bbce779d517bdffcc89dacad7d70c0e5256aa2bafe9e495260d39b42a0a39a435ecea952ed9057b28aca02d915f60381ffe1ce0ad4755987"}, {0x38, 0x100, 0x3, "73d6a99c23d2cbed47d806b221806d04f91bab91171dd588c7210a3b73a2273092e15116"}, {0x40, 0x111, 0x5, "6e9a4caef6f388644793999279a5150aaa73807b586db1adb3dc9f57f8563d58c7e1f47b33bd2277bdbbdf"}, {0xc0, 0x103, 0x9, "e3630f615899b9b9bf9467c702060e88bd0a8a486a786ca4504b47378570a6d547f9f8ef367494bea1cc06e04a7895e52b13170a49cd3c20d840d16f6892ac7913983c554d8efa81eaa0d0e973ea1ea50873a683e4a063470b51b2b90e64ef7b66f1bd1f7697c03599f598804ef8f3512b9c28d85ef47c8bbaccec7dbe5154a4119dd7896aec53c8361c5bfbeb50a45ebaf2a210c0ba696844ad85008e37fee8638fa4d65e315d81ac4699b0b13f"}, {0x88, 0x11e, 0x6, "e6ddfaa02b0dcfb274002772370c67256d94b7959a2025ba47626c5eb1f7ae6dd4b5a250f3cc990460ce947a1a2e3a4f5bc70d0720cb5cfcd717e6f8ccfa8ee4ffc3a54718fa04c6c127af8dcacafdd225d5b1e9601ae38a2fe220265fb19b19da01c3fd19d6cc38f637f52e25ddc0ab98322b95"}, {0x70, 0x10c, 0x1, "0c7bd4135b9306358ad6937bbf0366c72989b2533c7661eee07aec6d533abb34c45d608ef105dc763a29d1d920d055482db421bf06fe2c7790efb6e5696c81e40759224bb59a4d1fa79279bf45b1fb8fa614c95c80c97c806000f07ff1db"}, {0x58, 0x11, 0x8, "d372c6ff111f7822ff535c5e4bc460d496e9bbb9b4ad5a282a61ab07557e28dd0325f81357495792feb834cb036442e50b6dfcc761fb0d79ad0bbfb0f2853eed0db6"}], 0x570, 0x400c815}, 0x20000000) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000e00)=[@textreal={0x8, &(0x7f0000000100)="66b8000000800f23d80f21f86635400000d00f23f80f20d86635080000000f22d83e0f01c8d20d66b9910900000f320f35baf80c66b82a5d888766efbafc0cb816afef0fae830d5c0f060fc71e643d", 0x4f}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:47:32 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x101) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) [ 151.099653] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) r4 = socket$inet6(0xa, 0x804, 0x1c) ioctl(r4, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f7620bca48c89d43469179370") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 151.293456] Dev loop0: unable to read RDB block 1 [ 151.298497] loop0: AHDI p2 p4 [ 151.301727] loop0: partition table partially beyond EOD, truncated [ 151.309774] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:33 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:47:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) socket$vsock_stream(0x28, 0x1, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, 0x4, 0x1, 0x4, 0x3}}, 0xffffffffffffff8a) r2 = syz_open_dev$dmmidi(&(0x7f0000002800)='/dev/dmmidi#\x00', 0x6, 0x412000) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000003200)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r3 = dup2(r0, r1) sendmmsg$nfc_llcp(r3, &(0x7f0000003040)=[{&(0x7f00000000c0)={0x27, 0x1, 0x1, 0x2, 0x15c, 0x1, "11fa2c6622e075cf2e58d7f2b354a382b48e1cd64763677e6cdace9e241256be298f1ea04346927684a3ad53a21f980b6700efb05459319ba3e66e89ac48f6", 0x1d}, 0x60, &(0x7f0000000040)=[{&(0x7f0000000140)="75fb0c261098a95f83069e7dd0eefded39e98dffb4f244f2509e45f3c0b1d9a685359fe1a0da957b331a2473594243a6e0cf789f361ccb8b99b8b2cb597bceef17f781cc9ae9853a8a4a9772a31ff4847d7e", 0x52}, {&(0x7f00000001c0)="c4e2164f4073e99b4ed21a964629ebd8483093582129f568dfb04c9d120b86c639fe2c8b62e53a1f2ad99d2fe9f38dd26cac966f7dc11047c6843f9d52a054541368a58d5f7393d9636e02c2c105783ccda77106e1", 0x55}, {&(0x7f0000000240)="d6001489938370ae94fa5a80c263a420ec016501fb2f09afce6ed9ffbb70ea8eb5ea98be15b601e9c630986c72827935ca79274ba94981aa2889e7e0149a2f6fdca31f2cc6744f21f65e175a64cf1d17b8f11933d1b5460892ffca147ec08878d2a44d2eb1d1c699d343fbdbf6557679dc2598095d3d5ace319325f665047ec75c9db21f8dcbd6889b42820fdb95e872a9a5da6077cf3d5a62dd", 0x9a}], 0x3, &(0x7f0000000300)={0x30, 0x11f, 0x8000, "57809583eef3a16c29d428cdb120b4ecca0af60102647c043850"}, 0x30, 0x4000000}, {&(0x7f0000000340)={0x27, 0x0, 0x0, 0x4, 0xfffffffffffffffa, 0x1, "fafba79e89340b6a21766e912afeba2c675e46a3358c4cb2236e6789e123d4eb460c18d17fca049af1766607b887be2f3ea708ae6aa4f691ac19cb0ef51fab", 0x6}, 0x60, &(0x7f0000000400)=[{&(0x7f00000003c0)="dc8f05aaae2faae7", 0x8}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="2800000000008c010000000000805fc428544fc7dd64064fd5a3854198535c47a300000000000000"], 0x28, 0x4c805}, {&(0x7f0000000480)={0x27, 0x0, 0x0, 0x6, 0x6, 0xa6a6, "616c24f0bcb5140548c55ad32255cde16ef620a7a982fe8ce941a34548c1ce007c8650bce1a44296a18afde651f0aceadab52071c3b6049b226cc3906a160e", 0x3d}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000000500)="252edddfd6605f7514701fa45ee66bf263d9cfbc2e3d2c15fc984398a175a9924d09a39231f17d733972ba46f56b0ee13449f33faae5459c6818a39bf2975802d7b43d6b316ff7f019b05d5cbc1b6bcee668d45c424a2ecfe769d082f39254ea39cebcdbc64bc8b4d005186e5ddd18235589e94b814a3ca3e976971ff923bceb24b5fe42d5643d6421f639e3459feaaba499ca2bd7cdf638f7e8cb96b701a58d17bad44544afa7fc3ddaf0cc352b7398538661e85c078d4a4bd5c26a0c7101685308a53abc59a689f60bd0d14f437424687a00e8ca1d02655438010d511ca4a132bd781a7614090e851bd05f65cb0e742e4a1402c172", 0xf6}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="f190aacb7ae13f0b1feca6089fafea40bf1f338b220afa71fccadef230cfef65a319119dd1d961e1abaf3a98c612", 0x2e}, {&(0x7f0000001640)="57114bd77150cbe7e86f4edccaef046485e06e08502d492d0827e7ed3c62e085e6cd8131fcaa9c3167379d3a4910e31e25f91c17721db2b0d7b708273722ff652a8edb499282c82e712761069a17694c1748895d09d3f68d774bb8f7bbdc57974c9c0cf8c8d24d57449cb9862cddae2b3dea5aca623e6e0e4c92bdc3005863a8c77df77ddaf1d6abd145e7b68e9181e483cfddd3762340e39e019b58208ab1c5b6b46ac4337998", 0xa7}, {&(0x7f0000001700)="e1053de6ec1f9f9ec223fefc4243a2a76b25c0e2c3e2c34577c63b0577847100ddc9fc68d3c4ec91376e68161dd13e4d5fb2060a43f4", 0x36}, {&(0x7f0000001740)="aeae84b3f0a10e945398a50f4b06ed8d11c691e5690b7b6b78e429669fdc46af571afe330d8f2a8292c434a119185be0bb0751f7e6ed31fb68096c12cd559c3c02f9847af4c4cc6533d6d8bd8b03260479e959ee8a9732c7913a3d1bae4c908bcf319e53964dc43cfe5aac5f3757e82d563f51bac9777b7225e0748b42404f6d7c32a4e76eb738917f0836c57f1ffee028940b0e01f05732cb22eabe69b269bbf3bcfd089c61", 0xa6}, {&(0x7f0000001800)="b7feb6e2b74a09f2ca5e7b999f0504fca82614bb41ed23b1705fa762c93d0152a7cd594118fbff3b8a67b196736c0b175087a9d26c25005bc8d154a89980e311cd0013c224135a1c90d7efdaabe1c55a20c15fe7b135be4132deb93b08e2a456f002dda0e94b9fe5649e0b8c0051b8038a664009f4a620e9a6e567888ffb1b685c37bbf9b5d1d5dc349c987622ab935e823dd4faccd05f705292389ae757f95c4229f8be47fb462de7cd7366b9ffe3b90b3c7688a7ccc34538040b64e9fb93fda6846b0c0a13efaa9c6d", 0xca}, {&(0x7f0000001900)="b478f974779621bf80dfaefa792db1a285b060ebc102aa6390a7c530dc8583d1319cc05f796d4498a50505cb615a91b6ab33588ed0066bfaa187d762d70a2e1bba4d38c1d2df35d8e11c7597ce14f0fd61cd772b5dafc02b248e046b3acd697a5957b54c0a9e883698af489b48832f84e4cbb1a8d0d6b4", 0x77}, {&(0x7f0000001980)="9863eab692339216a7cd76cf90006b25ccdbd7130eb2e0b057b30a42d64ff16995b88d1f0554dc7ceb81a6f149236752af02535029d184241c879908c84d2c289445e20da5e1a9cb31a3878d1c197fdb79174da270a110fb93ac70287ea5a8bfb86296dfbba8566c25a4580e49343cb28fa1f5db6b816407c7943751b14bc18e94", 0x81}, {&(0x7f0000001a40)="0cc9e9756f64660ce1d0ea0be951c347c59ba01007dffb8b38ab383ad7dbbf6a01cb24978fb6acc9f42d1477b92de3c82960ff7795fd02f335522acf9ccb097fb5ba481b4dddfaeac90d211a473212a793765dc5687f89371c7f3f6c30ca4acbd71fceba75dc409c0cd13b036b74fb819edeb4d83191e9355440630856978f7030549130753bfe7dcabb951d38ea5357a7b49ad0f4217285748672b8b62fbea5368ea751e6b5535c30569291df8d4628edc7681e1a7d3e28744b8a3b6252ea8cba01bf45f13033d821b19bba5229ef0db3624d7b", 0xd4}], 0xa, &(0x7f0000001c00)={0xa8, 0x11, 0x4dd2, "4a4df1c1eecc32876656dd7dfa947598f6b039117c955bebea1d8751750693e7f881b5bfca1f9e92bb4068af7e00ba735279718accc3439dc9a0dcbf2df8e45d12c3bb9a3e7dc80ca5040b364c11fc3a650cee8812eef2edeb5b73ff5acb969dc6b87778b70d30acdad29b5f114183c01f3117e1daa16e341a2b2d37ddaf1496ed123d61f300ce3d3ebf4cdec4c4f888c1"}, 0xa8, 0x20000080}, {&(0x7f0000001cc0)={0x27, 0x1, 0x1, 0x5, 0x71, 0xa1, "104d2b61d5cf551e2de24464a95f53d52cc78cba268c091e5de1b10cf182b71fe3f981f55741c175d0ca49c7fd8123ebaaee330fea86a411a3d804afd5381c", 0x1f}, 0x60, &(0x7f0000002380)=[{&(0x7f0000001d40)="f7251200880c040a6e0da8b6d772fba4a5cb30a38279cfeb960b199ac974739cbab7", 0x22}, {&(0x7f0000001d80)="7e533dcc8aa5c52f656c1c9d3d59d2e7ebbfe4d4ad918ca59b1d1dab15115ae05d1da519f30dcf68866e0e57680a66fb6db565bd6dcd2bcca591d23293e0203826299eeb15f435361702cd7f0bb009bf7c6d6967f4341d0b6d368e967eedbc715940047df07ea24ab5a6f4f239ec2bac0678159b0b49c68f1d1f510a179ebc2eb22eeef88eface38069945e376e627b4cd6775d417db18ac13dd581a5eb893dca450fd69b7b7e0a1bf9b37d5a864fec3a3168f1e1ff79eac88e001e65ef9ed8247f5ed2c1b659860aa2f73525e051e8a2b05d7ba7b1b1e88a11afbdf1020", 0xde}, {&(0x7f0000001e80)="44f27107a60dbb593ab8e985947c99997340c334c91443375e2958b1f801fc863513585d32bef8e102e88ff0dbe32bb868b9b68fb71660c6efaa5d4cd1167a8482a5110dc4ba45eff31647ccee8699fbbf9bb0dbae9b3261b3d360cf45343dee62c492e2b70242c3c356cae3ae283b0c2244b1f0601c881d2e99b78d4a2a4e9b7abcd618e6f5ee915de7a8196341315a3af91cc3abe863005c78628f30b6b538520a834ce71d4501f52a0ed91c0591a91a0ea2ee5259906cffbe10be9a8416", 0xbf}, {&(0x7f0000001f40)="a003d5e6595fd8cb45f539f4ff26c7f7d07d344666cc778fd2d999c8a9333c0262626ee2e4f0266edc4bd6ae6098a3b813a01fd0f36cb91090a36544c1a7b7633414331d6de6e092de7ec8a9dfa3d9757b978254d16e902890d61667d9e043f9c616effb56ce6ac36747b692a90dee08ed333c56b3b44f22c35e5fba24aa28398ba5617deb264a4c93bc0025d6c550", 0x8f}, {&(0x7f0000002000)="f7c7216a5a2ce457393ef201872208c3a61fe956520ad3af78059a75d7bf6732b028edd19c0c3836f2849b1b06ba5f5f103b95254ced894b37f5e61d123a5a5e9183aa729b8aae7b92bd2bbd218f77df1210d07a51e96e6bcfca9a96b223edb7c7f11a12eaeb92c85ca1ba3d3eb7d3b8f9b7e28890a86ecd3e1c6ea3439241f807f8090465cc0f5adc7327b0707f08fb4d6eb3e8b1811e83c51285f45539b4", 0x9f}, {&(0x7f00000020c0)="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", 0xfe}, {&(0x7f00000021c0)="f95616e90ef98113f5c93b2ca7443764e58bfdaa6938549903680615a95874945e88ab0b2b3063140e9e623e061522aeef856d0ee440b325eddca704b319a7a72bb606ad020005f92e27afa29fe7bdf7c71ad8bf7132969bfb064822e4688316ea430da824ef22fc5a7e0c91120a4343628e637c06a6e4111cabc5a20b85dab1fc6f436dec26bbe444a89bd094c078bbf3c5029751177be3f21a148504fa06fce5979c35d5625227e2f212ef0dfa19766cb3784039cf54e7bdded1b15f34d7", 0xbf}, {&(0x7f0000002280)="bf981c46e6db343a81cbe6c1a4d147a417fe0dafb335d3d589d696ec4698a9875090690ee434e14627d0b0a9c00cc03e7e1f582f0a781b41a559f79a1ce09abb608883433e46759efdd6e8828b8b359074a7ff5779c94cad8c7b5e1a5e0c297ff776e83d3195f55340a6bee862512c77e719537af86e7f83b2e2f57ffe1c1ab8f4ea3a1d3f1c264d9e4d270cae", 0x8d}, {&(0x7f0000002340)="5a136787cc86c5187f237ce857b7e52caf718ee60531", 0x16}], 0x9, &(0x7f0000002440)={0xc8, 0x0, 0x3, "308a707ffb79643d48c5f581b0ec136f5298a85d3bf19fc19258670dcb7e6a2aec32e372994c8c3960ab451f2b1ca5afa28cc858e21665229371466969fb13569ed4aafbb46b790f8bbba0e81e1e403bf3082641a6814221098674dcf48edb750969832e0114c3a9efc71cc5498d9c407bd1a6ae41dc13a6da6c85e369acd57b906d032f5ed60b02490dfa4024bfaed512356a5bf116a38127a347edd7078836d8aac217243986c7b963b6b714aa464ce193"}, 0xc8, 0x4000000}, {&(0x7f0000002540)={0x27, 0x1, 0x0, 0x7, 0x0, 0x1000, "d895a053f7c640f29f44960f0a07b089adeed5b25bdba6a9f9a0306e606d70fc76814d9abbe1ba50242d8f1ccab7ac1cf71e59ca1c62177c3fec6920d33adb", 0x5}, 0x60, &(0x7f0000002840)=[{&(0x7f00000025c0)="d29a03f5bfa68d9eef168d9d395c1a26732595e0f2dfe6729f46bb61104ee506e8146dc97a4c398b79b26028dc942ad1ed12fe9aac7dcfebd767d48e984cb3f26162a3c956842ce88a925eccce287f62cf40d7e54dd67055bdf907518b97b086c2488f057d69f7c6bdbf05c0eef28ade70a9bb122da3d892b0fdeef45cfc083a3e351a898b75a32b45fe6160f954a621af3b15f671c608", 0x97}, {&(0x7f0000002680)="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", 0xff}, {&(0x7f0000002780)="07e7d4d54935fd24457f7aa0c81cc1a95d88664a9405f8256ebd0a8fe3db7398d3f5ed0684aaac5ad4ede0dea3b21460c630c2d01ef3769c417f947b2cd38690e438e40c0f93445c0a752da8580672fc05b50f69a3d6cb79489224c12c79a327e5cb59ec5e05", 0x66}, {&(0x7f0000002800)}], 0x4, 0x0, 0x0, 0x20000000}, {&(0x7f0000002880)={0x27, 0x1, 0x2, 0x0, 0xd80, 0xe, "16f10ad4e4029937edf7f0a6befbf907f4987f2e022634b9b6cc70fa4e7fab35c1d5db43fe5bf3d619da1e1ea6dcd6d7c2f05a9e7eb1d03a0ac573e1ff52af", 0x37}, 0x60, &(0x7f0000002c40)=[{&(0x7f0000002900)="20e9af320f039c5869017db2abe2993b65680762c5bf8b082f0b31294998f060f50d8c142face04e20f648377c881f437fa8dcb5a6b7cc33d51054371976d40a9256eaf58515c9fbe82017d0574d872bec260255a09b7958c2e877e4f454686c0191b87054af0255222dca0a5c289125cdf538a672d1e7f0dd8c8b2ebecf5a527c3c35a6587433468a0086c489c9b7dd283424211e732c8f08e656c33d49fba284bd6c5a1e70291b9e621bd75801f812b6b5060fd36c7db3c28aa41a0a4cd42986384e791de4d06fa39a00692f0036c10c60faad46934e3cf498", 0xda}, {&(0x7f0000002a00)="60ed5579fa05547733fb531edeb1a89f99896dd42d4e2e3afcb4e8e8affa227865bd8d02a56da5cb0dc59840d4bf7c1790f2a20b229a951c6bc6c87a3662a71a9ebfa57792c6ba7207398353c69e95e86fe8db796a2185d564445c7ad23af4e83e4c3d5ab53468fa3df2db8366b104510413a4ded352c6a7d77c6f7c9393e2e5fcc938a3f9", 0x85}, {&(0x7f0000002ac0)="0f807fedf05f1a44fdd6ba9df92a2aeafd7c1538acea6748f186d652b4d59a125d14d9d9cfc4b3d6c02ce315d9cd1d04526701d1bcacd4958bbcae3774e8b7170094b746227c0e6a0170971ee98262611f6e7f375ade6e800e4df44278a731e1da966350b597cf99385e675749562e9155eb", 0x72}, {&(0x7f0000002b40)="857e0d3ed734a848c8e6cd8c74516e791a95e1f69e0025c3cd094cc5487d8709bb05ee427b4d8220e81d5a13de2212573a000ddf3d8223b3928333563f4a24b6a315b9c2164f7ee992b2e0968f245f5e47a83989dbd4548c1672e14666a7c90e5e97c4fa89be89c2fa9710fe5cac2735b61851ebc4224912b13cb487172f51db3a97b5b46d7566edc4c78284d6aa74d5d97e10458ec796049e0b002538cf0c871cfc91438e96c71b9206b63f1aa95c6459a3339fc479a519d25cb24fb815e10caedf18ebef3700eda82fb7128a6830fdbadcc3a5ecd944da239bea0db89b0e10080af4f25e56d9041f7a", 0xea}], 0x4, &(0x7f0000002c80)={0x48, 0x19c, 0x3, "de1a106edfd854ac7e542e4122fe5807b8bad3858cd4e9c91e61748605d1c7a0eb8671fd0aeeabe77dfd8100eca534e7fcc8478a76a6e3"}, 0x48, 0x40}, {&(0x7f0000002d00)={0x27, 0x0, 0x2, 0x6, 0x80000001, 0x3, "1a935a3d1622f1178540f5f3ac8edc23729c53df41bee9c929cd861cc6597961fbe7ec10406494132c5ef048c54bfa10950fe4b13bc95082b04bb81ee27f94", 0x9}, 0x60, &(0x7f0000003000)=[{&(0x7f0000002d80)="1871105f5d9fef9c72ee0b3c252be44e6d0d9764c5722d7152604ebb927ab377714086b48c8ca35e05d73694971bde11b600ce06c4ac8caaf165735fe46aef03dbdfc1faf65eea07d8ac904dbfa9a2b612e7d3e60dfa8d3789ff6f224ff2c9", 0x5f}, {&(0x7f0000002e00)="d22e4a65384fcb071dbfc1d09a00b38993efaa803dec2d854e18e118e32a3c1c9287f18ade3beb9bdb0e491b918e76d8606e29150a83622e9f798f6bed15cb05e54aaaec951462f00181169e30128fbfbe3c077ffe014b9c555dea5edd8651e2a0a2675b27988f0ea012677bed56995f4e26c28021df4a9c8d3135d6dfbf0f8cf7d7d3e20fd7016ab6edda52bbb21633147c4b5ca46e0d68cf10f291794b743542cfeb7521cab9936ba76abc2b1bc348ab24f0f5ecc34ffbba9745c601ff39da838078ab2b1af67fb1f713b51b383d396bd897b2e839ca94bcef87805c3d2723673d838ddcdcde862bfc281351df55f1a0a743", 0xf3}, {&(0x7f0000002f00)="085edcb12ba0934d7038bab0f3d40c45c999bfa5fb0166de88913485d9e58a7fe1ac2f60c0f2609413a5cc5befa1fa3953ce39332e31cc081b2b2ac4c13e0314476ce855b7d2ee076bd250fbfb5836cda6917237aa6e82ca44efcf2560857da26485374a892a907b67f1a9cf2d1cdfd3ab7f9fca9780e8b7e53f0bb6252e3c45f1b6f082261839438e4220d14b31b12b095c481e8e1dda0ac7bbd7d4824d79c5c97fa513d30f9fed38f8ac09b2a0b543ef0ed38393b51a7b04a2c06f0da298e945e44ceea9bd8cad42a1033d", 0xcc}], 0x3, 0x0, 0x0, 0x80}], 0x7, 0x24000801) 15:47:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000380)={0x0, @rand_addr, @broadcast}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000880)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)={0x2bc, r2, 0xa00, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x6}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}, {{0x8, 0x1, r5}, {0x1e0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xda}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}]}}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x32, &(0x7f0000000000), 0x1d) 15:47:33 executing program 3: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bind$rds(r0, &(0x7f00000010c0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) ioctl$int_out(r0, 0xc0884123, &(0x7f0000000040)) write$P9_RMKDIR(r0, &(0x7f0000001080)={0x14, 0x49, 0x2, {0x20, 0x3, 0x8}}, 0x14) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000080)=""/4096) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001100)={@local={0xac, 0x14, 0x14, 0xaa}, @multicast1=0xe0000001}, 0x8) 15:47:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:33 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) r1 = socket$netlink(0x10, 0x3, 0xf) getsockname$packet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast2, @rand_addr}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @dev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'br\x00', r2}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0xf0ffff, 0x2}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 15:47:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) socket$inet6(0xa, 0x804, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001700)="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") recvmsg(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/21, 0x15}, {&(0x7f0000000140)=""/70, 0x46}], 0x2, &(0x7f0000000200)=""/28, 0x1c, 0x7fff}, 0x40) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x1000, "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"}, &(0x7f00000012c0)=0x1008) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001300)=@assoc_value={r3, 0x7}, &(0x7f0000001340)=0x8) r4 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000001400)=""/242, &(0x7f0000001500)=0xf2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001540)="6d656d6f72792e737f6865ca214d5eaf921774617400", 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000013c0)={0x1, r5}) connect$l2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r4) 15:47:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:33 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'syzkaller0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x2f, @rand_addr=0x9, 0x4e20, 0x2, 'rr\x00', 0x25, 0x7, 0x76}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e23, 0x2, 0x4, 0x2, 0xa6c}}, 0x44) syz_mount_image$hfs(&(0x7f00000004c0)='hfs\x00', &(0x7f0000001540)='./file0\x00', 0x0, 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)={[{@creator={'creator', 0x3d, "1500c8d4"}, 0x2c}]}) 15:47:33 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x42}) r1 = getpgrp(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f00000002c0)=0x81) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0x100000000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000100)={'filter\x00', 0x0, 0x4, 0xc1, [], 0x0, &(0x7f0000000080), &(0x7f0000000300)=""/193}, &(0x7f00000001c0)=0x78) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000200)) unlink(&(0x7f00000000c0)='./control/file0\x00') creat(&(0x7f0000000240)='./control/file0\x00', 0x1c) close(r0) 15:47:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x8000000000000000) [ 151.918460] Dev loop0: unable to read RDB block 1 [ 151.923449] loop0: AHDI p2 p4 [ 151.926742] loop0: partition table partially beyond EOD, truncated 15:47:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x40, 0x8, 0x20}, 0x2c) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='lo^(mime_type&vboxnet0\x00', r1}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000000c0)=0x48, 0x4) 15:47:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x400, 0x4) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1000000008012, r0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x501080, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4004, 0x0, 0x12051, r0, 0x0) [ 151.965740] hfs: creator requires a 4 character value [ 151.971079] hfs: unable to parse mount options [ 151.975909] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x400080, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000500)={'filter\x00'}, &(0x7f00000004c0)=0x44) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000040)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x4b8080, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000240)=0x8, 0x4) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000280)=0x401) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000180)="7cb09868fa43cebc75cea155968a33aea342115eb86976273564efe3c70f7b92963b2e529ad814ae4ef59ed8c7d48917b96c0f652b8630f9a20e9f32b5bee5bb578995c2ff3d2de73db5214f424be67f55026eda7150c37b0804392dc0d90ca42fb439d86a3254337f249e10438dfdf06c") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 15:47:33 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000000000000) 15:47:33 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000d1df52)=""/174) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000000)) 15:47:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000180)="8b39bd9334c58a008f6fd3ea9fb6a40abff02e332e7d30bf8470867ea741dd3f68d59b21034f4759cfccf3c3171a072590634b85016663800c02f8d273a5fbb3be", 0x41) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:33 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000200)="ef08d4461ee261edc8fa9e92d310fbf97ee57544647977fda85727da94b30b6307473d2da9bcb2014b04246f528b45a954598cc23896577bb86669de733341a433649e6e5c944e23475097bf48ce7187a5864e7a40d7dd869f0dc563b18cd950d639adf957422a6f0a685fb4c114e2af8c572186f710581ec1573929c822ba55828c6a4302afbb921a97813131e473428be887554b2540dcc6ceddee355daa4ef693fa5074a39faf1f31ce82c4f9244da6368d2a05a5cd57780e2e0000000000000000000000000000", 0xc9}], 0x1, &(0x7f00000000c0)=[{0xc8, 0x19f, 0x8, "299a5ecfa66f100ec923c14663fea8bbe7ab3f4e4f8e75ce007758dc4fbc140dc42914b4ace906810858ffb86f6100e1eb42d319e2b76ad860f00405959c7508c4a3ceb6e3e3b05c92979ad996f89fea007730e9f84940d32ad342d355e19e4922bc81035f579d0498fab3f9d257ffeca978144473adf51e4499829ddfe3cec8c8fa793aaa3e25c0bf6759c7841ba60c841b5796382625445cc5d60be22719d2acaa38302d3537a85ace75bea601c122dfd5f932508187"}], 0xc8}, 0x20004040) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000300)=@l2={0x1f, 0x5df1, {0x1, 0x1, 0x100000001, 0x200000, 0x5, 0xfffffffffffffffc}, 0x6, 0xdc1}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000380)="03b359040db1e19f23e7adea059e39d3d894490fef744b9fafbb9760eb94ea3fc85ac97845a014e1ee19896cc2e171530d271fb89f9ef003848cb7f2b9a56f240f54570451f429cb29539f2d6a9e8335fa1aa3bb18020fa6c9", 0x59}, {&(0x7f0000000400)="fb34963f51a21fb8ffa19f91ee51efa3aeabd2b54877d7715981013b78d0fee9d576009ee46f463fa68257f1fa31a09464f271ab33ad7a9de36333c2f5f34d90f7313fb58b933e13d0b41ad8c1c1993f5c2c1a827a24d6fad5699b1401c901e42f99ed18f478e0991c142f395f4555d9fc6366193c0d7080f2502e", 0x7b}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001780)="d0bc1c828fc8166a0cb9a41d3d53dd4b6df6065ec2a6d22e90ca7c50aecee0eb7f6813ae26519bf57c67ee4ba1554775c810dc78f790e15e6c8d88c20e2223ba3beec738bfbe5033dfacce7004c7db371d93ed26e6367ee18a98d5bb1456e75c930851dcf2f52b639dad8f1bb1a4770013dd44d8160d30b2dc79b969c4ac9cab7330014d7a987400fa26665570a768dffafcc1dd18020cce2e1338e97d66440a6ba06f448d0d9cc95222cb14dae8126ec85e114a9de149bc813c55f5f0b595534c7e376e3207d85ed1fa117aa59592ee4383df8d1a96bdc517a97aa88efb56711c45545d0d9fbc7bd1622a99c9a67a58bb0ffb25831f685c4b3912aa8462ae1b5322ecfa4297e1105699a1b3066349a793e653c81ccecf87fad3987a77636131d8c79822bf6a58aaee31c4be1af2db10356ccc1150ec96e1a9f8d54a52cd05c32e534a44acc23ba89987ad7cd0ca3226fe3870e5bdb37381b4386293fac57488fd81bb54ebc5543ec46ca3ab35bcbdeaf7d67fb3443405ab27fd9c924b16aceaef154e83899530f6856735cd8e541e016fe957232922e59791b5a8d51a6da833cc860e8fd81323647fbe668142bc25a93fb5c709420af4c4c5ab7207d581455e5e1703ff67521bf8e5da5f072bce07429305086d4a4795d968559bc15d67fd709382ed66e73c7af8227036037016c98f19db3d766018c010819865d87ac2215a87a65549ca418beb684e6e756feca3d9df5b8de9a1b1a8ab2d6f80a513304aa439c9995e73f26681517fa80538cd0e4988f44821d5417faa4aefd684cf411192efa8b2bfec69ee762b5ed3d054128b45cef5e01a615c216b4f447bc20b7bcf02e21abbffadd41d7f3a5855a0e7d710e17e04df7dfabdf3e50841bc527915a73c520a84a604e029811216483ee7928b75facc8e46146bf49c830e2943efb20e59ef362117e17a56c5436025ad9cf5a5c6c7baacf5c657f5adfc54797bd82919b9b29191b9fe6e6d917254c623ac4c82593ba3f01a0d9805f8719f4323b4c77a7b7294538306bf479000cfaa0c69c646f86c555f0569f40ba80b5b5ab46ab420342f8920ca83fde112324cac3fc18d30e9b898f1f32b14fd0c28bd435e2b0440f05717c9c0f1790f7aa53eea253aa51f8d281856b4f431b77e2acb2836008f3e2b8fdc5156c091bd510c7488a02b4a9acca1eacd35df55c639af3d085832032ddf68bbf022b2436c7805f0f78225542262e936e3d8ce7d5c1753d3d3cd044908e9a817269fe85268e216cdffd7455526dda91e1cd4939bc1d279e7609b0bed56b9c945113a0850148d23318af90e22d80d91601bdfca54fc0afda6f32073107da347820e98ba1b95ba19a000af379513118f3244d6ee0419958e0ee712395937716f8a2779b03d8e8a5fa76cd278d3c9ea65cab87ca6eb56d946a9a4c57a11fa127e7be538198c588b6672dc9c71905e60e9f69363d478c1a6bea45482c006eb8f01bc985945470de3e787c56f2d3246d3f660851407865378cf41ff478c3716b310157f3ef16f29d9ef60cf994cc91e5806cc53b26e80a13eea714d03624ca42173f73498776a402e871eb37744d6dd0d3af6a591d45aee9ae886950bb370f95b2b839457ca35fead97fbd90b9a129291ddf138fbe168fcb2d1ed51cf1956e715855bde083e8111ec314db7b5ae973225afa95f72962abb63d29ff39574de25bb284c5fc9b4e8d437635346daf783f2fca727000955ae009dfbd6f27ac5dfd2661c14d848b617852cabd74dcfa5c4ce313dfdd03be5a4da129988eb5c85872cb92086e299f6fdb099396b5641ba1fd7c1cd2a70ab8f0e3a55e0e0eeb4c58a4910f17bb092d1420933fb84c800cf42602633f1d6a5f14a3f7e822aab7a37a8aeb96849e48bd34e1753477a4d690ed32f83096f1be932fc18343549153a4d6dfe4de22697d7af4f93d38b96b00e9093365db965ea5fac747769eccb7cde7b85c6342504b6960be4d494d8d2acd0b1d3fd21748238888881b32879c031d99ad93d226e2f47f98d9eb908275a8d7c19b32289005291bd5d04bbc12a39a5eab8dc769be09fcc11b503a2c153c92219ea97400ff20b252e461000270a36204a23006d9b13cec6e95bbe91166afbad38cfebbc7b8538e86be377e9ff140c7258bcfb7e97764f37d88cf932fe432382f97f5d94be193c66aceef308ae3f2c8cc95238c21f44dbc22bc625c954f5e090264ad99cd94335519e96ead79742e396015a06b4cfb05a6b86e380d59e26effd234d0092138420c68b7729275dfcec3fc77a08e5aefeeea835758b877fa711e686cbaccde843758a6b4f71f65178df1971157b23371951be30a6b9585ef0b23aaa10c258bd95aa18bd1d5e5da4d5d81a3908c7860d37f3c129f8b15ba38949597ea3b83244efc1e2b5792edda47a755df0c9bdd4968034ea08289e3243dfddb1eac095e9b0918631a06ca39d8a48e9d5d589e4f36c938662ef6344be9822e442bb5db6914b8c4bcaa75158706303bccbc78eb70141d7644127edf4641b4dccc120efef212d40d6c1cd03475c049d36b9f7d7a519bc0b79061a95c22a6b028607834d45356a4645e418dac6c2c42ae85a55051c40b8ed1c7d07b51c17836e90b33cc62838f2cc8196502bbd926f27114c82ab7abab39a66b9bd8828c361c8532efae752c9b2d86f9a3843b0e0675f95c6ac1114bcbe63f4085bae58a5f2d640e0e9b476a25629eff7b07be638db899c2c7152bf7cc0067a35ec0c34b2a51f2241280c384b907d53dcf32510e690ed9e84a7eba206146b869891050d02683b2b83ee84001a8efb6b94977d9f071f0f5cbc2d7086ca0eb4481c3d854137765df4ba86a8870567efcb0fea70176d385854bddd959bd9ff7ad34557460b6198bd9139e47ab140019468229f2ba8b68f54f3b67afc668b02cd0ce776d1a609b0cec050a48e18b40bc730a74d2b95ea35a223d12b84bae048390d2e40d66bdd2dc0d8202940c298c5f0d687607f9f1c2b8fe1e8703845c0af41045a22495dbbd692aa0acbe03f39d3f00013a8b090d7028e541d8033a9720e8e9b9a615d0c04d647efbb1086adee00f3b5929e4685f0e8d66d423af0694553b09576da3050845ecb86c07a72e5d201e1cd05ad163491ae925eeabc31f1e6497f2688527fad8f8da2d3254f53b88a4a8af5f2e703fb5f7b47549c9969a73834e0b99b3b50d6fef8d14906cdf0c84460b8cd05399be2e60d4f772dc24e2f953d5ab0f4079cccbbf681b2d26196c7dfc9c15c89bf8623afdb0d1b8202a24f47c1367f714a3d5eeb956d06dd7610e6161c88ffad541a6e31529aa395d988818547922a1f0b92e92d0c19e5df2ee116066d9403b57f9947cee1e98b9fafe04104702a31fd7455e4ba69f75102d8605973018602d25d6aa662590d4ca1e270f9fb444df61aa96adafcd98995d86ac56814b95373b3752820d12ebfa245c12dc665db1c70bd48bb5d095f7889a90962285b12d447e5a298c3c0ac6f17086bf42c986c689a8a8dd5d9955a02c059d10ffaa4bfb9195ecc026014ef23688036641077ee3e9250a040a8ee35bc273e51100bfe6123d86a162188b18795fdbb598c6d894bdaeeb9126e4d88053091a039fb99bf139037a41a17835ca894055abe039cdc4a5059ee8ecc888bea0691090702bddd432ccb16efea457dfaf229344dfddbf5ca64a43c329552e48e46542a3e608ee87413a1159023ff218661d7c274c9bb168041d95bfb8bfadf8c7322701961214398d94cd0281d0b740f5daeccfe3eeb5b400e6e79a303745730195df130fa2504c375f543463e550f9efd5ac05d25a6b04dc681b38ae0054d9206dfcc8584c68c56b1a4d13de8d788994061f9e14f23d89d172e692fff539a53567ae2e9ab2e00886d7c423a1eacdc24af1f408c7b8109335a537abcd907365cdfdf7906e452106aa3d03197263191c4a2ff622eba565faef69ab39b67a6e77c0d56782e3e5e6f6a18e09ccf46fffc1a641a4dd12be1e33e39188923c7a711fe7cba55ad778ee7663f4241f2892b04d33fa32b72af3af1befdc80767c5e83e4e44f9f62416413bad986aded7157b6034057317786ef5cc432408a9b25cdef5a3393438593ba884d7ddca98e11e3bd6eda7f5251268a8e27a174a960e8708a1e1163a24dde55508e340bbc2941235c6f1d4ae367ab17f6d96ed9500d52f6c612884dc88a2742b1345517b014cd2afe7371ea58facc78837b687ae182621a24180ea433a593bc2245ea0e98cd4d661ada79ff75c53e2a6724e7f8825ad151a8665b9888906f48f3a5ca60ec8a3dcaa35f5ff24a1a7cc4a2d2ddb6119ecf43090094e4c08c557166833f6dc3c4b5e2753579416c26c5bd7cbd705a26d71a9dc59fedabdec5ccccfa09c5898e48c83dc963467fdf0b9beee7c25f990e3829b7861c0fb7df53b7ead9c159667de29f0776fd44c00528292a08d169c517c4c259d8190c5a5ac12122d085c7ac922c135b9878aa993f23cf617f3d431cc58656aaa26dc7eb0fd28cf46ec0f452e3a81540503940a4a8822b8da206d887cee58e7f6c30c45feed97089af48038032524d551f3c3ff4750525d8aac541eac768c47b13b5a5a8ebff0ce0b20100258d7353296b29e2eb7427845960333cc198c90482d92c60490275778e76ae843c3ce640224b983bf7ae5afaca5dd01de5a98a9a92a3d3cd5cbaa256d58a0dfd1ac9e01c37dc9d16a482d57e82fb47f625f0c3c9ff97aa9d176ff6d9b5c60385348dd8c1e8500091e1b4a67ddd502fbf0d354bd93ba397514e003d50ccf5820f62a270ab32c3d04bf5dacb091dd5c92af490246cfd7f37d2ac42f91e1010ba5f63821c34c22b8e5aa1276d7f3f66c427504ecea6846b80344fe4169cadd7e331773bee2906e7d6580a923ac62c004e9d74c95ff6a9353488d016f9f64f488b8d7665404d3472ac97f5d775b8dd5dd1888e1b58202cbf42df738a08bfbe2628a1eb78e95c71d9fe2507fa02899b185385b99675f3ed377c8d9539427ce4d7a43ef8fae9ec50e1e66753b0ad9d6e57e587d4499fed1644d3d5f481d59dbc0ea2e7cdfa66a5890625be2657871ada40f288eead2c0a305fdb414a4a2691a0d8e5469ee34e29d4ca01aa12ec9e2130daae0c079f6f2a7a4ebba91a7213ff71831a909b9763068c9b03899b587d01f39fc33810f161c3a44358c50c72203c6fa11526fec94616d222e8794ec318a69acd9114864aacaa0a62192a3976f42a79492c5da5a9070c6fe7b1f0135b80057470377c3fbf55a5af22e78e375e5a159fed59a50b6758576da679f49e0840140f10b250954b37aa255d7f06f2c6f8a89953258e2aba2ea3c8a559ec1e97497a3eeb69457771cf83feef91d924da76f6e85c0cb66951bbb644267821362754d01eeba02bfdde79595891b646462d21373ca65b75ba3686e4fc5274c85b09a7ae4871509daf36bee1c93ebbce9a155467ccdb51280661f045656a32c6b561de7ff1d405b6ef67e7c0f3013a4abc88542ca7ef6eda38eddf9176028aa357757cde5d4190f03a262205ba605850343daf529bf19cde02010da9a0415a0d47e1f0b327b7a74b27b28345ae8cc00fe935acce6cae52c5a25f1c950a1af3fadedfe4d18aa9082982e18232a007390ff040bc4cfb068f9a2eb06a98697f6edd68f25767fb59185e353fc455c6a579264787265034c96025d2b18ff9c5a3a8203e6046380f6d8a75ccf950b31f48e9a9c03533f742221ce071659ad67bc547ac7b5f90a30726f98", 0x1000}, {&(0x7f0000001480)="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", 0xfb}], 0x5, &(0x7f0000001600)=[{0x48, 0x29, 0x9, "efac575309060cbf4e8d800b5fb757d4d5088442cb4dafb0e71c8e8410b3b1c2c7306648f51ba9c5993bfa61f58fe2b308f9bcdf8413da"}, {0x48, 0x10b, 0x51ad, "74b8cd6ca6c6a429a1405032dff54d7fdaf07c200dd2b12bcda692fbebb2c916268dff311699abdc7485b023388dccb5b9a3d9de8a5b982a"}], 0x90, 0x4}, 0x1) 15:47:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af61, &(0x7f00000008c0)) 15:47:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xdc, 0x800000}, 0x2c) getegid() bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x800, 0x2) 15:47:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) getpeername$inet(r2, &(0x7f0000000140)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_cancel(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x9, r4, &(0x7f0000000340)="1cb0090e6788a6162133bddda60405f2d3dfcd523eed0fc197dbc46b31ad1688da4bf30950583d224c5002c2316981d50c96adba31096b785e04aab51cd3dc0dc992d1a66f81f7845ad151b5760fe616eccdd102eeabe9e76423e84bab69dbd2246852fc2b882dcf2163a149e2c440ad14457669586a8787d9713d373dc4425f9ca4e36a441e6dfcfbdf5523eb41ee3cf90b048e3c5e034d0ce377e997e83e2e6c79e9de9d2b3174530605c2b3f98d6246dcb6cdcadd7b9cacf9ac1ea056a19f", 0xc0, 0x80000000, 0x0, 0x0, r4}, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) [ 152.729429] Dev loop0: unable to read RDB block 1 [ 152.734435] loop0: AHDI p2 p4 [ 152.737740] loop0: partition table partially beyond EOD, truncated [ 152.760689] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x40000000) 15:47:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x7) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100090a0800410400000000fcff", 0x58}], 0x1) 15:47:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="025cc83d6d345f8f762070") r1 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x3bffa, 0x0) io_setup(0x0, &(0x7f0000000080)) io_setup(0x9, &(0x7f00000000c0)) ftruncate(r1, 0x800) accept$packet(r1, 0x0, &(0x7f0000000000)) 15:47:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000b97000)=[{&(0x7f0000962000)='1', 0x1}], 0x1) finit_module(r0, &(0x7f0000000000)='setgroups\x00', 0x3) 15:47:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 152.937469] Dev loop0: unable to read RDB block 1 [ 152.942433] loop0: AHDI p2 p4 [ 152.945665] loop0: partition table partially beyond EOD, truncated [ 152.967225] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:34 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000000) 15:47:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000380)=""/206, 0x56) getdents64(r0, &(0x7f0000000340)=""/57, 0xd7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) tee(r0, r0, 0x1, 0x8) ioctl(r0, 0x14f6, &(0x7f0000000040)="9c29f5ba4c06d5ddf7e50c01ec5d7b75f1788bde4f41b2b8dafd7927a7ac62302093f2f956a400bb19c88353e661fb215afa8adde1eba570a3013e11b1101f13afeac9f85371d418caf6c37544171ee66a9dc3a5fbfb5c26c52e389d17b8929e20248fc4b94e55933a153a32d2bd9e55ca2e361bca485d08c5d8b95a1deb4bc1bdf51a7b6ca7187e0c83634d12e7dd1fa793402f5737c816bf7d321145f7675a84d69d72e2cf811914f0ca42ba5451324f09f62b06ac5af40a675e944e7838822fb4e0239a1f") 15:47:34 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/4096) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000001415c500000040ec47a000000000000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:47:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000001fe8)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195, 0x0, 0x0, [], r0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="8500ffffffff01005e000000070000009500000000000400"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:47:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340), 0x13f, 0xb}}, 0x20) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00a84b54acedc81d503b77a3571076ca928527cea483911fefcbaf43f123ba7c263a671431c15d13cc60aa32bcd7d5106012831519af40807078c381b5160148346267dce9e4606cdd56d45dff9ae47d2620bb51774fd50b5165a0e5be759c56db95f6103273d79295709d52542c200b78076a27cfa7f64b96840cc71423d7089b0b93acbb6cba97c17e6809015b0bca5f639737ae6d6292737fb10b33214ee0c836c938a7f3e6ece121a5365574fe55861549a60eaed3205d2d3db20b1615a50d496a08dd859dac8718bb60cf8727040000003aaf2c033d4a48fceb0ccdd082"]) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 153.561345] Dev loop0: unable to read RDB block 1 [ 153.566323] loop0: AHDI p2 p4 [ 153.569725] loop0: partition table partially beyond EOD, truncated [ 153.601345] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 153.640959] loop0: p2 start 2020327233 is beyond EOD, truncated [ 153.645872] FAT-fs (loop2): bogus number of reserved sectors [ 153.652957] FAT-fs (loop2): Can't find a valid FAT filesystem 15:47:34 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ec1311f16f477671070") ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x200, 0x0, 0x7}) syz_read_part_table(0x4, 0xaaaab08, &(0x7f0000000700)=[{&(0x7f0000000380)="58cba1e30d7042bc0fe2c283bdf3ddbe9a0066e63935a5dd088f0223dfd10a3e4c2490060d7ec23404af173229e6e658118f20d8def5a558e4f81f0252434fcee8178f48449366bc3de1919ef12eeb21b076bafbaefe12b5eb5648e4140afc9b970dc298dfd87aa423b46e3edc9d866b8fab9d6c62e08ce0d94bac487ae7357c7b1981d4cad9ce3eae94367ac421ec48a439d5c1ac899565d20e2d55b3652a08c01374237c676bfed9ff8ad7b94aa6b38b294599998ba580d3d31c1353a3738ac7ff160d2a5c3bbacaee31870a45b1f7c5e078a55fbb1501bc4b4a2f60f39d00684371cf2919542dfbae34c4694bebe8", 0x0, 0x1}, {&(0x7f00000000c0), 0x0, 0xffffffffffffff84}, {&(0x7f00000007c0)="81acd997112fe4", 0x0, 0x1f}, {&(0x7f0000000140)="58afef6bda22d8404c297e4ab21c05ea6eb47d4f982ea873a165f9b999108a6878215f80e26dad1283b507e37c69", 0x0, 0x7}, {&(0x7f0000000480)="538c0a8c0c2e3330eb2853aa81711a391a517aad153bc8d48e4ccffb9a637fb4206f1882da207e7d28ef54960281f5695e770eefbf9190f185712d87876dcfb293e917cbbb5e05419ea8740314049ddfbacab78e197b52f40b9fd22fa8742215770dff70ccf50276f29899d1d32604a069970ebd55a7f7e4031814184ef4c06fa02f3182cad4ec4dbdfbb07ed5e8ddce04d8c023e99d00a7a5ff52e7c14da4be8d9646b55db55c07ea50b3eed3df94c8e49eed481797b7601a292c3181bc913f30a49db5d295cd238f8f2924f45b52183c2615d17ecc5142632978c3d04cfb397b901b9fc1200dc4b20471975d", 0x0, 0x1}, {&(0x7f0000000580)="242b1fafea36b3edc5d28de4f3079268f341f77e2c51d29a3c5c5b5822485cdbf3500539ac310348389bd93dbc1d27c2bc6a251e8a584b3facba3464e69a59a5bd5fe3af81a107c05fd44fa6866f6bf5d023c340", 0x0, 0x8}, {&(0x7f0000000600)="98fcf08b72dfbd23a0572444f0ecc4d2fd1c2d28fe5e1d4a575ce492fccebd5158eadc10260b1126b74c4b5b06a3966d6b33c63848708961795c6623e0b69a83dda05edb030fbe62a320999538e2e6fb51015ea2cfb28f61983237216a203e306587797f3920db1b30c48a5d9eb5ddf694f308eb60055947f0964138d473d2e40de6d6d9ca2f4235a569ea37e2329caebb5b68266782518b49bb83ca6e6f29bb952d73dfdb4c30a07e6b57f312f80f97c548befc0cf2a85127cee4ae9fffd9ad8890f26802925041e6b2232c7b6aa2bd0935f0347841b4a4d32b92264532a0"}, {&(0x7f0000001400)="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", 0x0, 0x10000}]) r1 = dup(r0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) 15:47:34 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x7, 0xffffffff, 0x81, 0x3, 0x3}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x6, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x7, 0x21, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfdb9) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x3f}) 15:47:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xfee00) 15:47:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 153.684444] Dev loop3: unable to read RDB block 1 [ 153.689396] loop3: AHDI p2 p4 [ 153.692626] loop3: partition table partially beyond EOD, truncated [ 153.704475] FAT-fs (loop2): bogus number of reserved sectors [ 153.710415] FAT-fs (loop2): Can't find a valid FAT filesystem [ 153.718284] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:35 executing program 2: r0 = socket$inet6(0xa, 0x807, 0x7f) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") timer_create(0xfffffffffffffffc, &(0x7f0000000400)={0x0, 0x8, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, r1+30000000}}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) [ 153.789813] Dev loop0: unable to read RDB block 1 [ 153.794810] loop0: AHDI p2 p4 [ 153.798070] loop0: partition table partially beyond EOD, truncated 15:47:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 153.884585] loop0: p2 start 2020327233 is beyond EOD, truncated [ 153.920892] Dev loop3: unable to read RDB block 1 [ 153.925955] loop3: AHDI p2 p4 [ 153.929200] loop3: partition table partially beyond EOD, truncated [ 153.940533] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:35 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) dup2(r2, r1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000000000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x4c, 0x0, &(0x7f0000000600)=[@transaction_sg={0x40486311, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000001c0)}}}], 0x0, 0x0, &(0x7f0000000480)}) 15:47:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000000) 15:47:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) write(r1, &(0x7f0000000080), 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000023000005000000000000000000010000000800000005000000"], 0x1c}, 0x1}, 0x0) 15:47:35 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000840)={0x0, 0x2}, &(0x7f0000000880)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000a80)={0x0, 0x2, 0x4dc, 0x8001, 0x5, 0x80000000}, &(0x7f0000000ac0)=0x14) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000b00)=@assoc_value={0x0}, &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000b80)={0x0, 0x1}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000c00)={0x0, 0x2, 0x30, 0x1ff, 0xa67}, &(0x7f0000000c40)=0x18) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000c80)={0x0, 0x0, 0x10, 0x800, 0xa0}, &(0x7f0000000cc0)=0x18) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000d00)={0x0, 0x24, 0xa0, 0x35d, 0x9, 0x101}, &(0x7f0000000d40)=0x14) bind$vsock_stream(r1, &(0x7f0000001940)={0x28, 0x0, 0x2711, @any=0xffffffff}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001300)={0x0, 0x8}, &(0x7f0000001340)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000001840)=@assoc_value={0x0}, &(0x7f0000001880)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000018c0)={0x0, 0x1, 0x1e, 0x1, 0x2}, &(0x7f0000001900)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000019c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x9}}, [0x3d3397af, 0x2, 0x3, 0x80000000, 0x7fff, 0xfffffffffffffff7, 0xfffffffffffffff8, 0xe, 0x2f4000000000000, 0x9, 0x0, 0x0, 0x7, 0x7fffffff, 0x7]}, &(0x7f0000001ac0)=0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001fc0)={0x0, 0xdd, "fa188f20f240a55651ea26daf39dfb2ae358f7d8952f61ee5baf1fd512797675090a5de1ceb0130a848fb53afd64699ef33179634b3462621b63fef1335c4418137a5e37bb67bad04112389d5cb832bd775adcf61206d1513bebeca8e77eee27c07af2c3a68dad57ac4a6d72aa743caee1546fedf919423e504102baf2be6cf119edc0db1aad5627f179af3c2283ba104efc9082416bec64c2934756cb86996bf901479069714a550f9e6b1343a82845a3f57e8c62f3a323b6fb508c34596369c96cb05b86d5a439f34b2c6ac99679fac7cf008991ab0c8845446f48e5"}, &(0x7f00000020c0)=0xe5) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002400)={0x0, 0x8c, "30d2b8ae22151ec1c73a2de35c7712b837fdede27be1a3ee2b478b53dd5e16ba9cbd2fb9e5609f47e90ccdf453550852f233798a1502a055ddd0840565954ba57b3306ce7d3ec0c210f1b9284c5109e03ddcb378780117b874e813a9e94204ae37201818a0b00e5267a1cfeea32698f86fb23821381604aeed329c9a7046335bc119907cc5e1d03aa7dc114c"}, &(0x7f00000024c0)=0x94) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000002500)={0x0, 0x8}, &(0x7f0000002540)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000002580)={0x0, 0x7, 0x30, 0x5, 0x7}, &(0x7f00000025c0)=0x18) sendmmsg$inet_sctp(r2, &(0x7f0000003b00)=[{&(0x7f0000000080)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000140)="acb4180056ac24bdbe2680de688db3c7f2ac6156aaccee0d00fc4ac0f327dcf5e9c3e5e3cc5310a97cf0c7daa84ae3ee967f364d7afa4e4f541c32de9dd2f9f358abbf7c0c6f87317eda423306a5abcfa760a75c2892cac8f122c39e7fedfc265816f95c64f6bc94afa4884dbef4b902d9501ffb921f6b2c8e188b068d670898d65f02e374e60b1b54784f06b6021a16d37c936e9d759c970c316a8329097712818d2a74fdcbdd8a2d53435048293d978d02ff4aee7b6ee0afb944e677bfa04d4b66dc", 0xc3}, {&(0x7f0000000240)="e6221297177e28182b3a7b23a8c66b2233cc1fd0270c0182265b493c744023dd5d678861726845e005dfffe960715c1ac5386b1f5dc625b5e3adeaf64e4c84da182cfdb703307f3251afa0850118b6d758bf1bf73b557ea25d591ab187", 0x5d}, {&(0x7f00000002c0)="4fbfc0373d9cd3139a57a46bdc98315f4e6f6e8328a60a90067da9808f25ae133b3cb8866a6497404db72102d1be84e1c996315cb711479b64b212aa43413630ec11cd4022c0a1fda1f4e8c0ba0c2ee0cc4c724d78f62c82e45bde2f3c421666cabe799437ddf99c1705520522451e4a328d8e5e620728394e09528b27dafb2a532a5b0396e073f52af6cfc9737e79c0d659d15efec4769883c7b802b5eed32e6fa2f65a86f20b7660e878da5e6d9af0da9ed0444f57a6c0fdb779b2775fe940184e516d2acc46c6782b7ad8822d4d6db76325896b43dabc8bcd67ad79491e09b3b52095f3c1897bf7", 0xe9}, {&(0x7f00000003c0)="f03f0443f50ed9d8a1422017032db81c52a25d70f7e16f529d753ed8ceda362a631d2192fc3d02cc13b45e56dc3b36af7fc125ba66cf7d55c42171f3ca897c8026e9e2a0a72790c8b05b124e14a6f97bcdb6e9bfdb8ded53ef8337f0b02818790556a597e0fddb1fce3c6d8095247eead184a0effa33ddf6ef3d40d1d5cdc84974af73909061190dceb06abb976e11f9abb0e2c12abababf0c39a43b2fdefad9f9eccf3724bd1df34c255a7ef2e3261c28e06ddadeb693ed80038612348d3dca9253d4e9664e", 0xc6}, {&(0x7f00000004c0)="857211f999de69804e3a61510fd7e6b924bd9f5e5cc217cd4c2f0acd87b6b4e65e9f954f6fcfef3efc65ada14a3995ed53dcae9322e5c864f5af79940c852296cf4e38a7013b976e11561bf7a1db31ec70b8c0492f2e673340fb68c8922bae8e22c481405af5357f67d75d456f59a48b2d851ca336e11a3698e03281d52c08e87521e897a9ad3667767435667abf538d80b48c918166569a00cfce9f97344d094a2ad8b6920d82322a8cb08ee6a0be135c6a10801aecc8e9c66ab5003e6aa2601e9648d0d8527748d89a5d87cbcc19", 0xcf}, {&(0x7f00000005c0)="3248ab094f9014cb6a35c38bc0eb17761e803fa0e1f1a41d3b220024358a5e160cc75720e7cbe7d7340f4da62a28e165772f09f68f6c6d07d56a3bb424c86f06626cae109f316fa39458ab839c65441b2ce5d8ac6614a3f5272b3520b211b77c3e128a7a669fb9b27bdf6d78a30af4eb18534617e99ecb19", 0x78}, {&(0x7f0000000640)="a704ae7b7c1cc25aae08e9b472cd7ef10cd23fab753bc75f8046e7a819aa9fe5a9e1e17c1cb9ee0a47b886700e029425cbfcd27f2ef6705fd92e0348c7b0e2fe3c358a4d9ddc36ab648ec97327a67bb72b755498f5cfa0cb90bf3983a93c5d3fc6810686ea7e8903a791c938e54f4c1eaccbe96cd1c7bbc0ecbb519b48aaec251ccfbc", 0x83}, {&(0x7f0000000700)="828f8a125954d29d31bb3b05ae5b95cafb8a815d5203ca5dcab52910507913db9aae0f3168b85bf6fbc2d203fdff54589a838d5c7c9ed19d6c77230a818320181ea54804d7bed9e01c7a65fa9cce329620701e041d2299dc20855683663e5c717ebf6715b7a7", 0x66}, {&(0x7f00000000c0)="8fc55f4ff23ea65eddd7bd056ea1", 0xe}], 0x9, &(0x7f00000008c0)=[@init={0x18, 0x84, 0x0, {0x100000000, 0x1, 0x8, 0x100000001}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x200, 0x10001, 0x47, r3}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x10}}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x7f}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast=0xffffffff}], 0xa8, 0x800}, {&(0x7f0000000980)=@in6={0xa, 0x4e22, 0xffff, @mcast1={0xff, 0x1, [], 0x1}, 0x3f}, 0x1c, &(0x7f0000000a40)=[{&(0x7f00000009c0)="c3a4a426d2f22f94a8afffc95e9dc6489fbdad918e0570749a57e35ef7cdd5873429dc6efa49d7a435886a2733c090bb49116722b5c402e8157e881b02c3a89dcb2c9954c1449d825e067365a13eeaea8682ab50b9a4bb12b1c3ab03a748458798082277627423e43eae6776", 0x6c}], 0x1, &(0x7f0000000d80)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x2, 0x8009, 0x9, 0xfffffffffffffffc, 0xc47, 0x3, 0x9, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8, 0x0, 0x4, r5}}, @init={0x18, 0x84, 0x0, {0x0, 0x2, 0x9, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0x101, 0x8206, 0x5, 0x6, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x5, 0x4, 0xfff, 0x2, 0x5, 0x9, 0x200, r7}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x6c, 0x8204, 0x2b38, 0x2, 0xae2, 0x8a3, 0x80, r8}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x1, 0x3, 0x3f, r9}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback={0x0, 0x1}}], 0x128, 0x40000c0}, {&(0x7f0000000ec0)=@in6={0xa, 0x4e22, 0x6, @empty, 0x401}, 0x1c, &(0x7f0000001280)=[{&(0x7f0000000f00)="6c9b3b4e5901564633d470b2fe90824f56f4c9548f965b88cdd0f6ad9d7b4a089cd5355f2aaa7a4afa6a517e202157a90f0f397b84635413618e32dbfba5b4609449e06fdb35b935243922993d4a65a648a145d701a80af57e4e3e53065c733700b168b8bdb3168ce864305d8c17abe4bdcb7c65948119b70ff227881ec36913d1f66c3a603173fea08f6d43b37573fff2504d8916c8e8389b6e32aa36ddb73364e6406f51abd921f270d6597f958b99e2439f4aef0457e0174a8227126449137312", 0xc2}, {&(0x7f0000001040)="a2e6a39d58389d4b7dbeeb1ed711a9b2a72593e157dbcece92e8cc4a7ad26c2513c5c0b14335ff485b68833ad04ab5c082e2c07aa5043afc8caa9a9ba49a36fd0034dc956b9a71f186a8bba21e4967d00b3a0eed4c0d270efafba37f670ac6ecad914077fcb85e161eebbf64d6758e16158c21629e171a648da7cd4107fa2ba6d947", 0x82}, {&(0x7f0000001100)="0e3209ec19cfe394a7573077c3743abda4f37fb94c5ac634b359d2273d41c06d7fcc56f2c252aa0af147334dc592fe4b6e61f291e22b81b69b7a58777c31b930df2896ac1f9344d546a0ab696e179439c8332777a0ab2d2a490a2b88d067a211a4fc45f975bfdd9f3d7fdcabe520e5acc3498c796a", 0x75}, {&(0x7f0000001180)="f81e7a02992e7d36db0e5691a05c9ccb184cede2e1ac8e1f1154d7e929a9fd2820699d7fd4d0b327ad52bd742926bfd94de9ab392d78b20ce0cef9f8822231a0c332d1f5317f5ad7939a59f3ba06f1b636e5d0ed15ee21131202ef61c132db17b0237e4356fea63ca1dad64eba08b5", 0x6f}, {&(0x7f0000001200)="e49575404f1523b0f3bf962adcee16db3ca9bde87c9488b9a0b157d6082625ec56edba9dc6682a5564f1fa632357924f2fe2a58a781abb6e9115a57d4acfa91d297cae62be99c98d3e7579f36d0d5a46df26a75ef740ddf9b6c0df13b339d590c6d5f6dddbd0451bbe11049152d3f4d81f2710879e274c", 0x77}], 0x5, &(0x7f0000001380)=[@sndrcv={0x30, 0x84, 0x1, {0x50fa, 0xafee, 0x8000, 0x4, 0xbb6, 0x3f, 0x6, 0x2, r10}}], 0x30, 0x20000800}, {&(0x7f00000013c0)=@in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x20}, 0x6}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000001400)="51d3fe50a5527818aecb8307d21ce435d63befde1c81051f4f042a4951528ffb91bf6c4a9f3bde801efaeec1cd31eb7c9187937da9a4e0a3d4fff24951bb88060fc767e5f308f1935f29e725f16a40ca3d0e2dbddaaee380a2c2ca868cebbbd1a2fe95efd6e3800cdffab09897b3b1c48708077cb923a079ee4e1027f0695cf4ff11c6469c8c98de2d7131bc6d3dbcea18a37c10d0256cbb817bdd8bf17bd025c046534dc7fe1d6035689b30509fd4fcd9e5f1adf1a419bf873a05d09eb61f6df148dcedb6d5119e01f2e82685f2fd2d5e471c2f03868945", 0xd8}, {&(0x7f0000001500)="8da71c125bc7d378146d64e2fe44a79af63db9219659a75955f3c738bc48cc4645259c3ff7fc3eca8fbf617edd6ae37d31bd11d600abbdfe9748dd1fbd8587a6eafe096b4b626cb2494570bddda2ea6751182b32ff1e1ba2134334c9e4dca83e638c40a1019ea33ed950f1d2cba07d22e99d837e333b12f09660dd762a2334235bb91a22e99aa2d1a887b194b4d437d9a79b74a2d9dce4b500855197165c23901e2edbeeb1570029e3ddca732b56f16533a69d31b87217af0486dcc66886f508aedb7a55ba5172d1432e67a7", 0xcc}, {&(0x7f0000001600)="e16ed2cb468f42384f16aa44482a2275f284977ed6da17efb7487606526feee868a464817e0075b9377f865266aa421ff948d20fcde3ea3d0a57fddc0e1739c31ba392629efaed2c0dee372671f634d13880ba1e4d41c0bea661cb40c02cfac2994312d407c870d1595f2b720eadd5c660c2ced7f5ab35fc588b0e8beff7afd376b46a84dda0859397b1807f232120a2528675", 0x93}], 0x3, 0x0, 0x0, 0x4000000}, {&(0x7f0000001700)=@in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x18}, 0x4}, 0x1c, &(0x7f0000001800)=[{&(0x7f0000001740)="0e56850f11403bb3558ed8efb72a2ed5ff58bfd691afc508b6b404d96222f9ed049e6b9c5000a0c12f1834561252eb60c76a43df94a68c82ab160056e3af84622637c7397f94f88ece5ac8afdd2e9f45ba20f760a08f1ddc4a27d055acf55fb60161e536e5068028c836016fa31c2f31879e9ff7bec4302af3e9dc3779cc54eadbf474cafec523defe896f902a04404d8acd02e18667ce017bd2bb3ef92f84de6e1fae72603cfe248f57693ad3b00abe213d99a3970ebd", 0xb7}], 0x1, &(0x7f0000001b00)=[@dstaddrv4={0x18, 0x84, 0x7}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x3, 0x1, 0x9, 0x1, 0x4, 0x7, 0xcd48504, r11}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x1, 0x5, 0x6, r12}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1=0xe0000001}, @init={0x18, 0x84, 0x0, {0x2, 0x4, 0x0, 0xf0b}}, @sndinfo={0x20, 0x84, 0x2, {0x72, 0x5, 0x3, 0x101, r13}}], 0xb8, 0x1}, {&(0x7f0000001bc0)=@in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x200}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000001c00)="b100e06de2a188b28c8a3f441e8b58b537b430e3eb4251c9294b3c57653366fa808466754842d291db96f39d49f7681170ec956e4f44428f3808dfb3785af3f014ca7c2cdbb08c3369b25b677ef69e6e141fb412a0923249150a4451cae95d93d51fb3fa76f19ffa41a388ab25e135bbbd720ccf955184f405d1a7e48423d45169c91cee74dc179c3437f7e14f7a52394059", 0x92}, {&(0x7f0000001cc0)="5bf80b93c7fd91e14616396b481aed2b5578ce2ff76795f8c1ccf7356ea0fb7a969ad72c8630737b6ce47832bf8726bf336e671e3bbb569fbef0ef8290bc6b878bb8c712704410355ca6de4b39b7ff3be1644291199c0065601e707b777505dd54ca9dcd4d604874ed0b01830e837507", 0x70}, {&(0x7f0000001d40)="4ac75415affacdf3b60b6da574aa6ba7c466b115fad06f22cca63f05b7126953105345fb067b5095b74468a032d8d58441f62032ff2d71fa022632ae8638055e01266a2489dd528c0b7e184a2c96612792d454b48814b1674a6861ecb4f9875ba443c251cce5542670f4cd3d78bfa695d7001ca76cc5f4e9116192856085d1635d92101f07ef036d6e2dfc3c45a1079998f4323af41fa7c8e23cf1f96d9f17b5166604a21310", 0xa6}], 0x3, &(0x7f0000001e40)=[@authinfo={0x18, 0x84, 0x6, {0x8f37}}], 0x18}, {&(0x7f0000001e80)=@in6={0xa, 0x4e23, 0x240, @remote={0xfe, 0x80, [], 0xbb}, 0x8000}, 0x1c, &(0x7f0000001f80)=[{&(0x7f0000001ec0)="781806c66c884f79de4023f118f10623576b2a36cb63d2fc40f2efa0798e7ac84409a5f52239fcaa63a788720b56bba014bf22b60b72bbdb01c0041e66ee233de24f36ee1d9df0f165ed5d3caebbb29879f049aeae3794720f75a262ae1b468c361e22858354af308c150bcb650e0ff7f57a096b3d257dedffc381e6fc42a26853a3bf2ef92d78b03f731ebc7ff8b80e37e9da1e5e93f9a6a00a1c811d92d09f3bd824ce8ffea932", 0xa8}], 0x1, &(0x7f0000002100)=[@authinfo={0x18, 0x84, 0x6, {0x3}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x2, 0x2, 0x9, 0x2, 0x0, 0x1000, 0x3, r14}}], 0x60, 0x800}, {&(0x7f0000002180)=@in6={0xa, 0x4e22, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffffa}, 0x1c, &(0x7f00000023c0)=[{&(0x7f00000021c0)="0fca48e46721b62fa253da5fae98e3109f9369d78cc07d3d2e48046a0d5c5e6aff4bec28", 0x24}, {&(0x7f0000002200)="815f63f014f5ba895ef6b43352b84230f4196979e37837591e14521ba31d84e775f2841167d56e6b5db9d3791732c90294466dff145f4deae29bc706fcda634eee62ba", 0x43}, {&(0x7f0000002280)="927dff886c0ffb7d0b2cbe3ad8652533387f87e83c35266fb310dafaf9ed1bef054688df003d9aaa7b77ce1dc5bbade3088d3a6a95769b30976fd2761e2e1db7d76f9bd9fc0b0024e44953c986619a2bfd20ad7f8caf2da4468d89b034998d3300322d48148c1d13ffaafec3c8cc73de6bcf5e76cd61db5816d0afbf79c6050fd39b6597a0a301034eafad6d63843d7931a67f6fd23cb39dcdf9348b32d50b982b11f46f853246b42203c6b5afd6435df6e0cb2bb4b0da6c8ea51cbe27704604255b8790112b02c413db8252c615214d0e7707b152a67e47464ddd1fc799b36f41fb2ed18635a4af711f2b75186599579eccca1169c706c216", 0xf9}, {&(0x7f0000002380)="4b88236718a4803f2a88f118f023b557ebea8d9daef16b132ee95b6aaa9ce03f38b14d6f2f901a4e37fc46bab524ee0e3f6497e04c686891bc41", 0x3a}], 0x4, &(0x7f0000002600)=[@dstaddrv6={0x20, 0x84, 0x8}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8000, 0x3b57, 0x9, r15}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xff, 0x1, 0x80000001, 0x0, 0x6, 0xfffffffffffff61b, 0x8, r16}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x9, 0x4, 0x4, 0x7, 0x9, 0x1, 0xbeda, r17}}], 0xb8, 0x4000}, {&(0x7f00000026c0)=@in6={0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}, 0x7}, 0x1c, &(0x7f0000003a80)=[{&(0x7f0000002700)="78dd9dedeedab17e836925eac4dbc911619741ec713b2ed9dc852949df9f6f0295a1f97a5f6e419da0e7cd92de9291717641ab79344400897430bde9ed037200ec8cf70c806cc93502ab46baf647b7e9783d310bb269468ed69e9ebff5e0c8249dce", 0x62}, {&(0x7f0000002780)="874fa97a18c5e98244b5303ad7f884d11ad9274e852704a08cdd4785315cca35d9d262658b8c6abf836b9504e9c0d44d2dad91f0d62c98f11c5ebafdcc6f28af0a702d1bb06263f470caec9cf2549a72e395bbbf982fc65bf665827c655cce9d8385e63012967d90eb02f78914ff7b96aeb558abd6821b864869a20dbbe2adc7a408c23f491c50683358077857a70c7175e3dda64a2a0978fe962d18c8cb553ae9b9e70e8fdd23a6c5800f3a404705e02d377dd6e43c178e20906671ed070ed6baf3ddd928247139d6107127b0b7b7173b26a96e81fd5edf4b15907e54f2234f67608b8bdc518ed3a389c0a2bad2ec9753697997295600", 0xf7}, {&(0x7f0000002880)="e97a31738e40d1618f3aca933b", 0xd}, {&(0x7f00000028c0)="647014cff21b0db6b9974063a26516f2638192e4b24ffa9b898ec13bf76e6a094fc4fe609ed10cd888417332532fb202b7f21ecd2622d6d9fb1ae02e8b4772cb4cde774a7a9250f8eab14c3e6865ace59978ccd989995d7f2aace89b0f16b8ddeeccc09ae8a555d4d43460972d4274cc67c77b715a3cd1a2978c5f827fb3c3f8ed8020f1e85d7516436d12a65bf73f3d3508b1a9a3888f735bae4667be340143846296f08ec6820f0faf0478c90969eb51c770a79d32757a0d501ce60146cf294643bfab6fc33f046a10e28e7ef3768a099d19a90592124bbde52919c1d40ce6cdfe467b8626734b7a34", 0xea}, {&(0x7f00000029c0)="b1daaa64b87beb397f58bfdb7105e8fc", 0x10}, {&(0x7f0000002a00)="41c52ad6fbdcc8b57bb20d9068174fbc841289d472aa71ec956c25fa35e14a6ff7f585f4f209265ec92ee08a17356bb457570cc1c4ebed95dd8c44517676dd99e9a94a6fdb970b572d884241a8b6", 0x4e}, {&(0x7f0000002a80)="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", 0x1000}], 0x7, 0x0, 0x0, 0x1}], 0x9, 0x45) r18 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_buf(r18, 0x29, 0x4b, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 15:47:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x8df}}, 0x18) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 154.458908] binder: release 10925:10926 transaction 12 out, still active [ 154.466607] binder_alloc: 10925: binder_alloc_buf, no vma [ 154.472233] binder: 10925:10926 transaction failed 29189/-3, size 0-0 line 2967 [ 154.489483] Dev loop0: unable to read RDB block 1 [ 154.490115] binder: unexpected work type, 4, not freed [ 154.494522] loop0: AHDI p2 p4 [ 154.499729] binder: undelivered TRANSACTION_COMPLETE 15:47:35 executing program 6: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r0, 0x40000, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x4, 0x5, 0xb0, 'queue1\x00', 0x4}) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) 15:47:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x8000) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000240)={0x12, 0xd6, &(0x7f0000000340)="f830b7a39f72e846acab39000adc392399dcb9326b02c3759d419de209843ef206ce11d015d43c9efa74031aad2f0655a73dd6358276a9dbb1a9c0ce629b6e8ca37202c707bdf5fdd7d0555cdf39717e2a85ddd997d90c9af3932e8808322eee37bf88f45a4a359da82d44bb5767b03d2bcebbaba0a49a75aa7cf213658c7a39fd67803acd292f21d7f7ff20ae05cf946777a474a949034757c2a903d76fc436340cf89ed234514be9d569474e24070bd8a5e5015e7192fcc4f1a6d2dca31865ef2f3805e3928a7d56980e67a30f092067806eca1997"}) uselib(&(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000540)={0x0, 0x1000, "2729618de58a983787c3e72f4209e8de04052911c0070089ab08c20d87679a8614d58260b243e156413a2136974f1abe0ed27a05cd8bd939f7a655f2b3333e5b6f55a988b9bc346d58c8778ba15fc02601f74344ad5464f51f00abcf196ff1e2e4df2967b07ff6bff750a9289467f9df81f4432ad69532eda6bb2e03a9cc7275edccf28ae34b2f9bc1ee897dce5ffeb853c5b0d7501f26a79e50d66bf3f844df5c11b01319ecefb319171dab61fe269bcbaeccd2ee740d9f7a3661b1a37e03837f599a170dd9042ba38994ce388c1c98729d1dcccf840656ef31ba117e9f812e2507bf469d75cb259e3ce2dce025e2d72111c6785c4ea51f2b54570c39d26c425e8f97568b1129e2f3d9cb99a33f2ad21bd498afa3bc83c9ee2b635a1789b594180510054ae4a1dd42de74c5d0fc04db24f6de079fa44aaf671150f67235498ec12980a90b223217102c29cc9b8fe4e71b3eb745f74660a67020cf34819e37907c5dd77cb52c7ee9d2f99885dbb46384106de75b959fb6b548ebabf35e320f27233d4cabda14c000a9525bd39d1e76ef6801327e041c48971cfcbcb2adf037f5b77473b5a6e5869d4b13fa206e3a4f07895fe920d85020fbacb7e951fcade8fc0413fcf0d9f94db2847b95d3449f42f52952353d2f73c93364a96d2658b5e2b4a7da412dd5f0ec87c5b94a522854a6f0247f2a63f9d63e43934180f0c4f93afabe89062d5f701dbaaf79b6381177bc3a59da356b431874d9fdcb3746218942eab5e24a1c21919b188697e24ea0dc4619890d5362500b979d0809eddfe4bf51ec527581b320c5d51e4080769512db2ac62c43fa8a1244798037c9e0b0cc0ef00b117ccb9dd0907de76a574f123e6a7d3c96a56e9884b6b52af295061fec753b775a92cd9a9f76f5f8f06a21424278f01efa9d421936b44db8a7fe450e06db79e544118aec3a388aa16093885d126d1738edfbb8200a0adaa69ef7e214905f1c33e6b2c79a9fce10174c55e07eb9f68c69f1483ed3860be7f36eb37f3e9fb71430c11cdc18885f0f8b22ed273c86566d367957b1924cfc978ad89b253d4a6c330302d5934450e98a585ab1ece2eeea9505a88b5cf4a26c0f98f0112b59b615fb3c94f3f2434548441862919a6fd33e22b488d3ae1aa028e88a4940a860ed210b6c204953f0d71b3135d9eae6ce05c69673fe18edde02c5e50173978caf687f1e8856c399869c3b266c5a026384eff7e00be0a92c6f59545a6b12ceb1669bf4fe9541a6abb97c2693f808665ad71cf1515f6e38996d3ee9265d09406194788b07b2477a474e3c69cc5ee4d0cae09deac39523fc5781329adffac230c80afc4afe9396c4776e4c88f4ac9f377dbdc8f3e42da0ce0e5c3956845803f7493eb0c91db0a63ef319e8470c9046ca861c5c15a67c31f39ae034d1f72b88dfa0d42cbd4c25aaed0d5877d39ae39ed3bc93779974bd63ebf56b9570e437104402e98fd6e79a18a57c35edef1f941385e46ff9f90a258ec93122b70f7ba8c2cfb8f224b6f2c98fc900840a8cb0ad449492d1b4941130ec4bad4dc7165fc4775adbaac73fc055fd04464c4e2080957b29d09d2724ba77638c2edd9e111423389149840e32e196ee2ac54d01f46ce003f41c5143e10d87a29408fbc514c39c01f5463e966edea4d4efecba33140866dd80d67370a25233f642055992b5ea0327c58097ef8df6d412ef992712af824a511142067479869539055dfb2401b2e641a6566a33036b3ec06e68add32e4e74c325398bb6a1e8174ee9572ace36ffb38e8bd88cf8d6fbeb8ebcdfd518be7257bf113cb34244f63a20630e1763517939da80e74cf394cd5a6f2a85953aa588318df0c3bce01c40d8e256790240d5e38d4792c384270d29cb416ae2ba81c69a9e96e90c3e4992ec6c21415c4d80a117884969d1dc3de89814058090fd36516eba75643cc9955d4469e059f8e8b85eb870a6a68286b223614e6b56cf7425e32a76b4d3001cc330e66a699d446575e97fb620ab550a734f4e2ed0f685e016f6499c86e8c34b052de1dcbdc2ceee8019157bfe692f3ef38e2aa8f690c8a194b92244068b49708ecf99d67d3e5ef27b6c1b95180378ddfa720fc83be5bed921b7fabb4d9c7e735b8563d9775adca697f98b58b424bab116bd543092963894949a94e483596b7677bc6b1fe7e63e1270f8b93487871b39fd41d88cff97d15ba058fe1970573eaf40d8c26e287e87beebbefe8b28d62e7386fdcde716d66f614a4c652957cdaf209acd8a5bbfdc4b178b78f2237d37be39fc96b7965a2e99d3201b85b55b05fd4976b2a5fcfffaec256d1b887efe784ecca07cf75d0f5d8ee6d7d7f2ccf68b167b7fbd48ef179d788683a18bec466dc625d2b5f976346a214ef22597c44ab37c099f847f3a797d444cf675bbc1f662938b8ac683dee0030e1d0f00ae90a4ce075762ad068e34256d67b3a8dc5bd54f1058a270668800438b5fe7e84d1e8a3555bcbf07fab15d44e083eee553fbb093db15e1392937c963140fbb9f6068d88a982a5468f14a7398efca497e9ebba904f05b046d907d0e800d50c1f3420b46ca8d8fb384d612925c93f65c533e40bfc7c171b3ab1682dc912b5bed3a33c2b16261e5156f151bd16e013d984900f3b4305aa8f695b919179fb263d6fdd0b134baea017df2d1d8fa6846fd259a5460364251f0dd440c1526858f26cbf64c156fc2352ee9e155dab4895fcebbbb65395fba0f3d89a989895afa57fa4d1e3f22d652ab10b7bf221bb790b7a2f00aaee12d1b90baf1379984ba0a7b7a9d642f3126332c29e8cf306337d9ebc77bc77054372755ba7ac3fb72e4049a934bdd1f912ed66cd38889dad02545a90149679e6ecadf3fc80b0d36cba8e224f77a3881dae474dee042c316e6f997529428d11a5fd208c98bb97f11e7da3c3984846cc2a447f3757f2b9e440ebc6c7389bddd885a0ebea78802c24c12f75036b5ae560e8cdd3e3a1df616858edcb838c2557993e7e66b1478a3699fa8b1090295d82c2d844c20a7d26462b4a0ff55b1225b8f32583950f3e843567fd070ccc3e65524b3c4b774f291c8a0b23593ae447be5ca8275ec9d36bc2cb6c86cb024ebaa1b20e5bd070edaa90b13044866a511e2723f41bd59958ba8a66f557c495163d8bd75c009e62b64076c9633987fa630e99626e32ea974ffcca6e02c3fc0c6bfc39e6d9366e04ea3d477c2b3130f5c8b1d34d6ca66fef4fb3e8882ff0e3a47939b26e02be82147e8de4d8b48b049ec2e1a6d35f9783c78ff68a7c6a1f7ea08b56194d762be2dd95f2c38c00d460d48a3ed2d60c898f4574b17ef9127445148cc5b710afb138f647b678ffd73a957d8d4249a0252bf1fb8531c57204e4ef1f1c8f362b6e26b727e9668e194b41240a1d44c1376e8d7893d7bac3ff4dfc2210ca573169e9a7822c7dfa66c1968112c03c220399465738b79e6a53ddf228ec6be0a31b5188c33d74d834b2b42d299dbb26283f41c1499ed62b6d13fc42c1be81809e7e043f175774496099a774750e4904e897212d5f64c381c424b79ac5a1e0fcdfbdfe23c52f1dfa2e8adfbbae0c920957a7e04a7f221f08b2c7d004c0d0d6756d83b74f9a0b8aa04b3fdab9db69ff2ea84a6d4c15903b202da16e61003bac466cc7f9d661fab68a1e838d729d9d0d5cf3028052b99e68293daf03432f24aa7dbeeca4cf1f66f602ad4a1ca614c8afa4915c20f78c6f2cf2d8775c6c81b8c7bd04e5c1cdd3733fd9996df6d0748e64385f1c57c15b4743c0a4fe8f27c8e4e7a2558b9d61b2fcafebca64b83039c2f959662509ff8a937ca4fe268b82c606163b97177482142b1c697ddbcc26dff47fe8160aa4900739fecc526b5cbea84a2dd473aaf22a061ba95341a33f4652c709a3a6476129b2ac56b2cd95f1948b71ca877a4ad26d68d6b3ecae5e2fdaf3f09628ab2c5625728f0279bcf9f76676b05b4cbb19a63c1af01fb9a97408249b2b31e49c9187d3152364452ab225327e70802cba8fa67dea88468b96f714a7f8fa9eaadfdf363cc1094ab3547c86417ea9f8f986e9ebc6c0ce889570b9ca347424fd5c510c595b3f0eb6b9eb257a1d99c941e9670f5edf7990ddbae7a12bd761108ba963e83569419b03366405c8165f1509ba41ac8273b438dd468420ff63889d7f26752b8816e0f861516ac3872c855e4fbf0076d4cb2880db231dedfdc62833936875473ca0740fa05e3eefd0b115ff010f2e3168cb473f13554a6bb69dd2a25762a5ab198f9299e3641730f12b68638160d5102118bbdf1a51299f3c82b75bbdfc8b1391299620751e407c5058b76fe149440cb52952f757472c611710f421d6738bfcdaffdae11b8ccd95b6d9d31cabc06290d09f3a897cc4ded236aa40c78578c3dbad05d2ae0a0ab04e81da59d9e77e68ddf2fb6bdef3794e3438345e00b3409177246af8dfc73b6d50be9b155a9a6ae0184bf366b9af01e9c5df557788e7fa23d45b746fb4b0fb5c46122c030d66f8716dbe9754082511b9f17865b35c61fcbcd1ff4c121c621ae587642e88331b2e1329faa78dd6fb0eab77699bf53502d10b316e513a4573a39a7a5a8f8eeff0984e47050023a3e939bc35c0453f7a37501b7602b4129affb843d9937f82ca54bcfe430cdc7c3285add8cf713afe61cce795ef0fbbac28840887a5220298cd8755140f95a554b299e2ea1ca3204d3757f743f89cbc5351b3b9a2791fcf6b22064a1e7e16e10b74345d3ffcdc1990ecb05207d3ca834b914c3a6ad076b21c0b4effb3a63915ec969aa858d01985cae00292aacef3758a7e48b063359abee4a95d7e6a47a33f5b088970af657549b6473f270c67eb5126cb0ed9b41f085dc607b59279da4235fcb63057f270fe1b26a1b836c7b7aa8fa09ebb899e4032f71fbc45f8e6a898b00a9aa1d2c4bfcbe843858f6c3a7c7529a63480e63415850355371e69d06a00e7f208006b54c651bb900a99648083a056ab26da5d3f844c1f5a3924790cadf9b6fcffd173e9433d2c1cf1f0c9e88659fdc4ed93e0715fec06893e20cd6e6aba284c775b91f6857b4a462c260c9c40a009b4f500c8d2cacdb92f4e467638acb3e3eb76a70e255906f271c294bbf5380da98aeed85b9e3128448d224d956238ec766265f265d9a7632e0dda07da0354cfdf4651a4eb24a928d0e5ac29469f5fe8567ce1b575218a569ee0bb1cd96b35377e2066955706664f48666207a1c7dd0715ea939fddabeab949155b70897e26e024e3f6b0e096844b47e50e201104bab3066e9407f9cdc67490f7d30ce7600b03918fd1d60f33834ad132dde07f74766fdbe355467aac137b0c9c4d31424e3bde709cb3036ca176e264c906f31ad23f1b045ed038944eb7ea0f6bbc35e15afbea0bc35f0ab70b5d61b55f282003e3e32de7d4cffc4f67eaebd14b8c0f2bfecccbe47db02af61c41050a2a46c47443a150c3ad9e3ecd0e930ffd2356ae51fc3b60d67eeb3efad7c8d889ccc67f82ff020479ec009ca12b1f6c16b64a19e38461f488aee67e7a1afba9fbfb952f1be998fa2491e0449ef7d7d976183da37d3f3c1c4ba830ab57fe3149c1b0f7053b57721632f264b3d553e27fe03526c41f75826042b736ddfabe22acd544644b242fb74cccbb8eaf19c0a00a1637f7a0caeff8303d74b7447b3f5875694a5541673f033a5eaa19428574a8dd01187204ecd75fd78696e23efa89b471310451efab1c8071cb26cd0af5ddaf821916713dbac27ccecba31a69d6e481aef9bbb"}, &(0x7f0000001580)=0x1008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000015c0)={r5, @in6={{0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x19}, 0x6b16}}, 0x1, 0x0, 0xa826, 0x1, 0x28ad}, &(0x7f0000001680)=0x98) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP(r2, 0x4020ae46, &(0x7f00000002c0)={0xf5, 0x0, [0x2, 0x2, 0x1, 0x9]}) recvfrom$inet6(r0, &(0x7f0000000180)=""/149, 0x95, 0x40000000, &(0x7f0000000000)={0xa, 0x4e21, 0x1, @empty, 0x8}, 0x1c) close(r4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x1}, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x3, 0x400, 0x1, 0x7, 0x4}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r6, 0x8}, &(0x7f0000000500)=0x8) [ 154.508078] loop0: partition table partially beyond EOD, truncated [ 154.514842] loop0: p2 start 2020327233 is beyond EOD, truncated [ 154.526406] Dev loop3: unable to read RDB block 1 [ 154.531368] loop3: AHDI p2 p4 [ 154.534593] loop3: partition table partially beyond EOD, truncated 15:47:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4000000000000000) [ 154.553464] binder_alloc: binder_alloc_mmap_handler: 10925 20001000-20004000 already mapped failed -16 [ 154.600894] loop3: p2 start 2020327233 is beyond EOD, truncated [ 154.608543] binder: BINDER_SET_CONTEXT_MGR already set [ 154.615825] binder: 10925:10926 ioctl 40046207 0 returned -16 15:47:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340), 0x13f, 0xb}}, 0x20) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 154.641320] Dev loop0: unable to read RDB block 1 [ 154.646302] loop0: AHDI p2 p4 [ 154.649593] loop0: partition table partially beyond EOD, truncated [ 154.650157] binder_alloc: 10925: binder_alloc_buf, no vma [ 154.661581] binder: 10925:10941 transaction failed 29189/-3, size 24-8 line 2967 15:47:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x22, 0x4, 0x7fff}, 0x2c) [ 154.718312] loop0: p2 start 2020327233 is beyond EOD, truncated [ 154.725526] binder: undelivered TRANSACTION_ERROR: 29189 [ 154.731288] binder: 10925:10969 got transaction to invalid handle [ 154.737690] binder: 10925:10969 transaction failed 29201/-22, size 0-0 line 2852 [ 154.757512] Dev loop3: unable to read RDB block 1 [ 154.762490] loop3: AHDI p2 p4 [ 154.765716] loop3: partition table partially beyond EOD, truncated [ 154.780991] loop3: p2 start 2020327233 is beyond EOD, truncated [ 154.794395] binder: undelivered TRANSACTION_ERROR: 29201 [ 154.802407] binder: undelivered TRANSACTION_ERROR: 29189 [ 154.807975] binder: send failed reply for transaction 12, target dead 15:47:36 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) 15:47:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") socket$inet6(0xa, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xfffffffeffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000140)=0x7, 0x4) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="6ff2d9aca94b6e2e0ab4b9d877992041fc5c"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000200)=""/199, &(0x7f0000000080)=0xc7) syslog(0x9, 0x0, 0x0) 15:47:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x2, 0x1a, 0xfa00}, 0x20) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@getsadinfo={0x154, 0x23, 0x8, 0x70bd2c, 0x25dfdbff, 0x0, [@algo_crypt={0x140, 0x2, {{'chacha20-simd\x00'}, 0x7c0, "635f0282191cb6c9992af19a2b91759c58108b45eb3ec19f31007b24f3ec0b10533cb8445a2fa73552b9121dab052068c36fd0272bc26585208d2b8a99ca7921140aaaf5c4e4e88ff86832e6079d3c2e980ffb2513e301ad85ead1f2a2c65f595e75614672eac9c66816ac53f7058ebc3f133732013ccc9de75c22a26cfeae542fd869c74db5dd20ca555c1e7bd917a18e777273692427575832d5fbb04279d6912a6dcb8a915278d853bd67c846552b19868832b5df8c0f034f03962e06243cff98a9e499c341b64704160ffdaccf6aec2c5ac07de8d8412f856dc232c3a263b5a1e167c392aa6e9e1b5bcc1176a75afca440dabc1744b3"}}]}, 0x154}, 0x1, 0x0, 0x0, 0x800}, 0x4c804) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000380)) 15:47:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x448000, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 155.340584] Dev loop0: unable to read RDB block 1 [ 155.345588] loop0: AHDI p2 p4 [ 155.348854] loop0: partition table partially beyond EOD, truncated 15:47:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 155.385121] Dev loop3: unable to read RDB block 1 [ 155.390100] loop3: AHDI p2 p4 [ 155.393328] loop3: partition table partially beyond EOD, truncated [ 155.397792] loop0: p2 start 2020327233 is beyond EOD, truncated [ 155.404218] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:37 executing program 6: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0xaaaab1b, &(0x7f0000000040)=[{&(0x7f0000000140)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040400000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab4240200040000040000000000000000000000000c090a020c", 0x440, 0x6}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="c901769c44cbd919e7daeb4737f959613d05d47d793b4b3c511f1f7c4040dab75e844f8f25efced13dc2d49d296ea7dfd43cd38c0b20908e11b7b35f42f030fad3d8d8c84399cdc8b5d749ed4498b3ed06023b903aa82b4b3d94ecd65553aa87ab91ae097bb33f81c0263925b68d715f0b46831514cfb6d6d733746f45c5ec4d19e408c02a20ac4358862a437f6bbe85cee6cdcbcf4a00231783d4176b7bb8550c1f061196b8cdc1c0f8b586b08770166aa70000b17413cb1683cc07ec08ed5753f0c3fba7b6c84afef75ed9a4fc96"]) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000200)={'team_slave_1\x00', {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) 15:47:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000001840)=ANY=[], 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x0, 0x0, 0xfffffff4, 0x0, @buffer={0x0, 0xe9, &(0x7f0000000080)=""/233}, &(0x7f0000000180), &(0x7f00000001c0)=""/126, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000016c0)='io.stat\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000001680)=""/23) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000480)=""/32, 0x20}], 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000580)={0x12, 0x1c, 0x5, 0x3f, "837e78314287362ff71abac6f993d65ce6d6c3713f6edba821aa74f57985d299"}) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xfce4) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f0000000000)=""/10, 0xa}, {&(0x7f0000000240)=""/120, 0x78}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000180)=""/46, 0x2e}], 0x5) set_tid_address(&(0x7f00000005c0)) 15:47:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x400000000000000) 15:47:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x38, r1, 0x0, 0x70bd28, 0x25dfdbfe, {0x1}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000300)) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x7, 0x102) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=""/118, 0x76) close(r2) [ 155.910268] Dev loop0: unable to read RDB block 1 [ 155.915290] loop0: AHDI p2 p4 [ 155.918562] loop0: partition table partially beyond EOD, truncated [ 155.936631] Dev loop3: unable to read RDB block 1 [ 155.941650] loop3: AHDI p2 p4 [ 155.944895] loop3: partition table partially beyond EOD, truncated 15:47:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 155.960824] loop0: p2 start 2020327233 is beyond EOD, truncated [ 155.965047] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:37 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80000) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x8, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000001c0)={0xffffffff}, 0x4) fcntl$getflags(r1, 0x1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000f40)={r4, 0x1, 0x6, @random="8af74754d60c"}, 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)) 15:47:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xee0f00) 15:47:37 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:37 executing program 6: capset(&(0x7f0000000000)={0x4000019980330}, &(0x7f0000001fe8)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141046, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) ftruncate(r0, 0x0) [ 156.112423] XFS (loop6): Invalid superblock magic number [ 156.142178] XFS (loop6): Invalid superblock magic number 15:47:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000140)=""/148, &(0x7f0000000200)=0x94) write(r0, &(0x7f0000000000)="130000005e001f00ff00000000000000003487", 0x13) getsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000040)=""/134, &(0x7f0000000100)=0x86) [ 156.211167] Dev loop3: unable to read RDB block 1 [ 156.216126] loop3: AHDI p2 p4 [ 156.219387] loop3: partition table partially beyond EOD, truncated [ 156.230040] Dev loop0: unable to read RDB block 1 [ 156.235005] loop0: AHDI p2 p4 [ 156.238240] loop0: partition table partially beyond EOD, truncated 15:47:37 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$intptr(0x200000000000002a, 0x4) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4102) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x1, @loopback={0x0, 0x1}, 0x2}}, 0x6, 0x1, 0x9, 0x3, 0x8}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e24, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x2}}, 0x7, 0xfffffffffffffffa, 0x79, 0x7ca, 0x90}, 0x98) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) 15:47:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 156.260973] loop3: p2 start 2020327233 is beyond EOD, truncated [ 156.318688] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:38 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x24080, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x5, 0x70, 0x2, 0x3, 0x2000000000000000, 0x2, 0x0, 0x8d, 0x0, 0xa, 0x7, 0x8001, 0x80, 0x10, 0x2, 0x9, 0x1, 0x841a, 0x7ff, 0xfffffffffffffffa, 0x0, 0x0, 0x9, 0x3, 0x1, 0x6, 0x0, 0x200, 0x4, 0x0, 0x7, 0x2, 0x6, 0x1, 0x2, 0x8, 0x8, 0x1000, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x8600, 0x49a, 0x400, 0x4, 0x7f, 0x2, 0x40}) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000380)=0x6e, 0x800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 15:47:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa000000) 15:47:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") socket$inet6(0xa, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:38 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140), 0x8) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f00002ec000/0x1000)=nil, 0x1000, 0x1, r0) socketpair(0x14, 0x6, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000180)="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") setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) setsockopt$inet6_int(r1, 0x29, 0xd1, &(0x7f0000000280)=0x7fff, 0x4) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x2, @random="cc7e268fda96", 'bridge_slave_1\x00'}}, 0x1e) rt_sigaction(0x23, &(0x7f00000000c0)={0x7c, {0x5b000000000}, 0x8000000, 0x5}, 0x0, 0x8, &(0x7f0000000100)) 15:47:38 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x800, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x6c, r3, 0x620, 0x70bd2d, 0x3, {0x11}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40c0}, 0x50) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="5c0000000807080a28bd7000fbdbdf250700000408005b00", @ANYRES32=r1, @ANYBLOB='\b@q\x00', @ANYRES32=r2, @ANYBLOB="ab8d49e7c7880dab53782929033dc4af90f43c6946d431ecaaac3b739eb9a03f4ea22d08bb56d54d5fdb0b106a0294b193e797896d9cd600"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x24000080) preadv(r0, &(0x7f0000000040), 0x1, 0x0) 15:47:38 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:38 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:38 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'vlan0\x00'}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000180)="6df68c1f2b3820739c561f30acf5b198704d4feb34bd952a0c29e7eb1ef6c254b7d545b8b925829ecf982c361f9dcb34ac4e507bf79111d992b144784511b39b8756051d7b7b4771e38e5e09d18bf442f9c9c439b11f95034e406cbf4573a715990071bc6860b48ee1dff596abca04ce889a67ef6fa32ddd4b687167af4f36bd140c6fe125585258569591045d32feeb6faef40ec7936ecf82e29b580c4c1d1c25a43e33e05d9698d74805d597a1fe8bed81302753bdca90b79cd29ac5c8e461ab73883080f7f75c0af5b3e500e24bcb5a29fcddec898547444e8aa49a906849dad6de04a3574f5a9771b9d75de6959cb2386893d097ccaa42f1ce70e3", 0xfd, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)="b9f585f6106f952b619a540b705bc9edbb588fbe4ad18c05b34e97879957dd5350c99addc5368a840c9eb480540dc32de28865d9e00e351545b7f6e6709444fdb686fb67a2a319fa95b55fd4db0a82d7708d2a48be078c051c5039af105b6d325e66159c272c9a8034e54df80d89df70b54f4baf3e474efd23fb96e6bf2bb0e2e9169cfd", 0x84, 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x7, 0x9, r2) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x8, 0xeb}) 15:47:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) close(r0) [ 156.994699] Dev loop3: unable to read RDB block 1 [ 156.999739] loop3: AHDI p2 p4 [ 157.002965] loop3: partition table partially beyond EOD, truncated [ 157.010425] Dev loop0: unable to read RDB block 1 [ 157.015384] loop0: AHDI p2 p4 [ 157.018621] loop0: partition table partially beyond EOD, truncated [ 157.025984] loop3: p2 start 2020327233 is beyond EOD, truncated [ 157.033523] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x103e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f00000000c0), &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, @in={0x2, 0x2, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x2c) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000002e00190100000037c1c058efa2fa217eed3daa080001000400000000000000000000000000000000"], 0x20}, 0x1}, 0x0) 15:47:38 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000140)="0208000000345f8f26ed70") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x402102, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bond\x00', r1}) 15:47:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:38 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x3, 0xffffffffffff8c14, 0x7ff}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r1, 0x0, 0x44, "9cbaeef355b47e68bf076527d5af8f82d503e97bf21040664b1961a61f8dc6b4e52c1615b222f147f7b4283246340673070bf0fff21b0fb792d1f519b9399c86e1a6a4d7"}, 0x4c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x81, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x8}, @in6={0xa, 0x4e20, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x3}, @in6={0xa, 0x4e22, 0x6538000, @mcast2={0xff, 0x2, [], 0x1}, 0x1ff}], 0x80) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="00008c2c391a429d00e5e97e0c00"], &(0x7f00000000c0)=0x8) 15:47:38 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8200, 0x40) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x7f}}, [0x0, 0x8001, 0x0, 0x101, 0x0, 0x8, 0x8, 0x5, 0x8, 0x2, 0xff, 0xff, 0x91, 0x0, 0xc2]}, &(0x7f0000000180)=0x100) accept4$llc(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="000093009461bd65f60fe8425ebfc0e5e112eafc10175619bbead27105fc539126226c101b71b39e8332c6168327d58e3af52f10b1110302054459880195612b1c8ede96b50640bc1289ccf46db5331627852c1c6351def253945cf13cc05066d617256a2ba1619dcf11dfa71dc24229a951b93fc46902ca3fa8822fca46834fa16a5a84d4677320cfd7f41daee3ac08d493bfeefbc36806b18a542fd2de6a753b58c64a946decd5e03152d615507130f07fb79071b5484b6714c7ff188ab1d7889a00"], 0x9b) r3 = accept$alg(r1, 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000280)=0x5, &(0x7f00000002c0)=0x4) recvmmsg(r3, &(0x7f0000000900)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) [ 157.230055] Dev loop3: unable to read RDB block 1 [ 157.235100] loop3: AHDI p2 p4 [ 157.238331] loop3: partition table partially beyond EOD, truncated 15:47:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40200, 0x1) ioctl$int_in(r1, 0x40000000af01, &(0x7f0000c97ff8)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r3) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, &(0x7f0000000080)=""/188, &(0x7f0000034000)=""/95, &(0x7f0000ce1f30)=""/208}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000d7c000)={0x0, r3}) close(r4) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)) 15:47:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1071}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x8000000000000000}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="07aba59bdde875b3166dd2bff26e52651dd1dd3ec41f1c06eff19acb31b7349fbb709f4cfea45a0e5ac1041284253967e35c7eaa4d62abb06b5ee795ca7cbd8227a49768602fc13e944e6c135f26986c0108479bd8e36a4a01e05ad6ea555ea9fcb3c56307037c27ceb0584de560e8d76a29f79cd2586727364028f3cd0e40ae79bc3c49ce36a1f6f4e20a69b7d80eecca0accb25f8104b14594a0348f9a6a9a5a793d85174895e3e9863f43c0fd49faf87dac5119fbbfc95e7e69f70f790a", &(0x7f0000000140)=""/228}, 0x18) [ 157.291756] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:39 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:39 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:39 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x101, 0xc241) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0x9c2b, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000200)={{0x3, 0x1, 0x3, 0xb5, 'syz0\x00', 0x8}, 0x1, [0x2, 0x8, 0x5, 0xe8c5, 0x4, 0x3, 0x3, 0x7fffffff, 0x6, 0x81, 0x8a, 0x6, 0x2, 0x9, 0x100, 0xfffffffffffff001, 0xffffffffffff0001, 0x6, 0x4, 0x147, 0x3, 0x7fff, 0x6, 0x5, 0x7fffffff, 0x8000, 0x9, 0x255, 0x7ff, 0xc4, 0x0, 0xfffffffffffffffd, 0x40, 0x0, 0x80, 0x3666, 0x8, 0x22c9, 0x26, 0x9, 0x3f, 0xe3b, 0xffff, 0x6, 0xffffffff, 0x40, 0xfffffffffffffffd, 0x2, 0x2, 0x0, 0x0, 0x4, 0xd22, 0x76, 0x1, 0xfffffffffffffffa, 0x100000001, 0x8, 0x0, 0x7f, 0x4, 0xfffffffffffffff7, 0x7fffffff, 0x81, 0x1, 0x800, 0xfffffffffffffffe, 0xfa8, 0x9f7c, 0x6, 0x1ff, 0x3, 0x3, 0x2, 0x0, 0x101, 0x6, 0x8, 0x8, 0xff, 0x5, 0x9, 0x4, 0xa792, 0x6, 0x101, 0x7f, 0x0, 0x6, 0x0, 0x401, 0x1, 0x9, 0x0, 0xffffffffffffff01, 0x6, 0xfff, 0x1, 0x8, 0x10000, 0x4, 0x2, 0x7, 0x7ff, 0x7fffffff, 0x200, 0x80000000000000, 0x8000, 0x400, 0x8, 0xc6c, 0x401, 0x0, 0xff, 0x5, 0x9, 0x1, 0x0, 0x0, 0x6, 0x9, 0xd641, 0x5, 0x4, 0x6, 0x2dd7, 0x8], {0x77359400}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0xaa000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f00000000c0)={0x83a, 0xef7, 0x2, 0x5}, 0x214) 15:47:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x10, 0x5, 0x2, 0x10}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f00000001c0)=""/132}, 0x18) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$P9_RSYMLINK(r1, &(0x7f0000000080)={0x14, 0x11, 0x1, {0x0, 0x1, 0x7}}, 0x14) 15:47:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0xdf, {{0x2, 0x4e23}}}, 0xfffffffffffffe61) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) socket$bt_rfcomm(0x1f, 0x0, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x16, &(0x7f0000000040), 0x4) 15:47:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40002, 0x0) statx(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000300)=0x81) ioctl$TCFLSH(r2, 0x540b, 0x100000001) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000002c0)=0x1) ioctl$TIOCGLCKTRMIOS(r2, 0x5502, &(0x7f0000000080)) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000000)="cc5751d58803b5aee1cbc982701a493c3156c9183b0c5cc83b87cd0ab16682a52cb1b6f14470103250fc7821074477e8a42e9fc69e82cdd44b9ed9147e") [ 157.978282] Dev loop3: unable to read RDB block 1 [ 157.983315] loop3: AHDI p2 p4 [ 157.986557] loop3: partition table partially beyond EOD, truncated 15:47:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070f1b8526c1fee6156447acc165de6f77a2e9c375a2e888199dad3c9d2e9dea98b96083741aa33a102a79de8738ebd3acc77e1068c8a66d4e3045a44655aff5446efc8419461690dc67664ef2025660f") syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, 0x0) 15:47:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = eventfd2(0x0, 0x0) write$eventfd(r1, &(0x7f0000000000)=0xffffffffdbfffffd, 0x8) writev(r1, &(0x7f0000002700)=[{&(0x7f0000000080)="5565759488b04392", 0x8}], 0x1) clone(0x0, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000140)={@remote}, &(0x7f0000000180)=0x14) readv(r1, &(0x7f0000000040)=[{&(0x7f0000002f94)=""/108, 0x6c}], 0x1) 15:47:39 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) 15:47:39 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, r1}, &(0x7f0000000100)=0x20) 15:47:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x54401, 0x0) syz_open_pts(r1, 0x400b80) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000000c0)=0xc) dup3(r2, r2, 0x80000) [ 158.028434] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 158.097210] Dev loop0: unable to read RDB block 1 [ 158.102199] loop0: unable to read partition table [ 158.107629] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 158.114882] sctp: [Deprecated]: syz-executor6 (pid 11270) Use of int in maxseg socket option. [ 158.114882] Use struct sctp_assoc_value instead [ 158.150573] loop0: partition table beyond EOD, truncated [ 158.156188] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 158.181264] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 158.190213] sctp: [Deprecated]: syz-executor6 (pid 11284) Use of int in maxseg socket option. 15:47:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 158.190213] Use struct sctp_assoc_value instead [ 158.212165] Dev loop3: unable to read RDB block 1 [ 158.217250] loop3: AHDI p2 p4 [ 158.220486] loop3: partition table partially beyond EOD, truncated [ 158.249801] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:40 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:40 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x402100, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f000003a000/0x2000)=nil, 0x2000, 0x0) 15:47:40 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) 15:47:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1002}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000001c0)=0xd1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast2, @remote}, &(0x7f0000000240)=0xc) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000500)={0x6234, {{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x80}}}, 0x88) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000480)={0xc0000, 0x0, [0xc47, 0x632, 0xf5, 0x6, 0x401, 0x9, 0x5, 0x7]}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1=0xe0000001, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e20, 0x7fffffff, 0x4e22, 0x8, 0xa, 0x0, 0x20, 0x3e, r4, r5}, {0x0, 0x7, 0x7, 0x7fff, 0xff, 0x40000000, 0x7fffffff, 0x7}, {0x1, 0xfffffffffffffffe, 0x40, 0x6}, 0x90000000000000, 0x6e6bb2, 0x1, 0x0, 0x1}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4d5, 0x3c}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xa}}, 0x0, 0x3, 0x2, 0x4, 0x8000, 0x6, 0x400}}, 0xe8) pselect6(0x1a4, &(0x7f0000000000), &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x8}) 15:47:40 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x30000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e23, @rand_addr=0xffffffff}}, 0x7f, 0x1, 0x8e3, "5c73fe0c79f0ef8205e0c09df9eada59afe5b7de9a2424e5fb96d8540f1615c59beb6d26e1eda1c5bb9aabe5443af1ef8661afe9f5456570545205906888bce3cd2040327705d17e391b1fc7b213e654"}, 0xd8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x10080, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="a7f2a23a", 0x4) accept$alg(r1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000100), 0x4) 15:47:40 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:40 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@ax25, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@mpls_newroute={0x2c, 0x18, 0x0, 0x70bd2b, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x100000001, 0xfd, 0x7, 0xff, 0x3, 0x1c00}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x8}, @RTA_DST={0x8, 0x1, [{0x5, 0x4, 0x6, 0x8}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) close(r2) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) socket$key(0xf, 0x3, 0x2) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r3, 0x0, 0x100000000002, 0x9}, &(0x7f0000000380)=0xffffffffffffff23) [ 158.879315] Dev loop0: unable to read RDB block 1 [ 158.884305] loop0: unable to read partition table [ 158.929897] loop0: partition table beyond EOD, truncated [ 158.935497] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x4900) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f000068f000)={0x10}, 0xc, &(0x7f0000197000)={&(0x7f0000000480)=@migrate={0xe4, 0x21, 0x1, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x5c, 0x11, [{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@loopback=0x7f000001}, {@in=@rand_addr}]}, @policy_type={0xc, 0x10}, @user_kmaddress={0x2c, 0x13, {@in=@rand_addr, @in=@multicast2=0xe0000002}}]}, 0xe4}, 0x1}, 0x0) 15:47:40 executing program 6: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x4}], 0x1) semop(r0, &(0x7f0000000080)=[{0x0, 0xffffffff, 0x800}], 0x1) semop(r0, &(0x7f0000000000)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) socketpair(0x2, 0x80007, 0x1f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSBRK(r1, 0x5409, 0x1) 15:47:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x44940, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000340)={0xaa, 0x10}) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r4, 0x1d6, &(0x7f00000000c0)=[&(0x7f00003f6000/0x4000)=nil, &(0x7f00007fd000/0x4000)=nil, &(0x7f0000421000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) 15:47:40 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000440)) 15:47:40 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, &(0x7f0000000000), 0xa2}, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000040)=@nfc={0x27, 0x7}, 0x4f190d1b06f62363, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000001c0)=""/243) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x10200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000180)={0xffffffffffff0005, 0xfffffffffffffffa}) 15:47:40 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) [ 159.118129] Dev loop0: unable to read RDB block 1 [ 159.123162] loop0: unable to read partition table [ 159.148835] loop0: partition table beyond EOD, truncated [ 159.154424] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:40 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:40 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) 15:47:40 executing program 5: r0 = socket$inet6(0x10, 0x108000000003, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206020000a843096c2623692500160000c90200f0ff66039848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83c43ab8220000bf0cec6bab91d4000000000000", 0x55}], 0x1, &(0x7f0000002040)}, 0x0) 15:47:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl$TIOCGPGRP(r1, 0x80045440, &(0x7f0000000280)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 15:47:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x200, 0xbe5, 0x140000, 0x0, 0x0, 0x6, 0x40, 0x3, 0x6, 0x74, 0x8001, 0x8, 0x0, 0x5, 0x7, 0x7f, 0x8, 0x5, 0x0, 0x8, 0x1ff, 0x2, 0x2, 0x4, 0x3, 0x20, 0x7a1, 0xffffffffffffffb5, 0xc86, 0x6, 0x3, 0x2, 0xac, 0x6, 0x1, 0x3ff, 0x0, 0xffffffffffff0001, 0x5, @perf_config_ext={0x3, 0x2}, 0x2028, 0x1, 0x23d59046, 0x0, 0x3, 0xd86, 0x8}, r2, 0x0, r0, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r4, 0x200, 0x70bd29, 0x25dfdbfb, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}]}]}, 0x40}, 0x1}, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ptrace$getregset(0x4204, r2, 0x206, &(0x7f0000000140)={&(0x7f0000000200)=""/90, 0x5a}) 15:47:40 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) [ 159.718543] Dev loop3: unable to read RDB block 1 [ 159.723577] loop3: unable to read partition table [ 159.729471] Dev loop0: unable to read RDB block 1 [ 159.734429] loop0: unable to read partition table [ 159.745071] loop3: partition table beyond EOD, truncated [ 159.750640] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 159.761852] loop0: partition table beyond EOD, truncated 15:47:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x44940, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000340)={0xaa, 0x10}) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r4, 0x1d6, &(0x7f00000000c0)=[&(0x7f00003f6000/0x4000)=nil, &(0x7f00007fd000/0x4000)=nil, &(0x7f0000421000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) 15:47:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000440)=@bridge_getneigh={0x20, 0x1e, 0x601, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003680)=[{{&(0x7f0000000140)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003580), 0x0, &(0x7f0000003600)=""/92, 0x5c}}], 0x1, 0x0, 0x0) 15:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 159.767511] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:41 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)="232673797374656d6e6f6465762b656d3129a3656d3100", 0xfffffffffffffff9) keyctl$revoke(0x3, r2) r3 = dup(r0) ioctl$KDADDIO(r3, 0x4b34, 0x6) ptrace$pokeuser(0x6, r1, 0x9f12, 0x1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000100)={0x3ff, 0x2, 0xec7, 0x7, 0x2, 0x2989}) prlimit64(0x0, 0x0, 0x0, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40c01, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x5) bind$bt_l2cap(r5, &(0x7f0000000280)={0x1f, 0x6, {0x5, 0x2, 0xfffffffffffffe01, 0x80, 0x6, 0x8}, 0x56f, 0x413}, 0xe) 15:47:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) 15:47:41 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) 15:47:41 executing program 2: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x11, 0x3, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r2, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', r3}) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r4}, 0x10, &(0x7f0000002ff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="000000000100000000a12cd4ab9e022b56fcd9f474c1ced007683f79ea65d09ebb2cb00000000000000000000000000000000000000000"], 0x48}, 0x1}, 0x0) pkey_alloc(0x0, 0x3) 15:47:41 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 159.952490] Dev loop3: unable to read RDB block 1 [ 159.957480] loop3: unable to read partition table [ 159.969580] Dev loop0: unable to read RDB block 1 [ 159.974524] loop0: unable to read partition table [ 159.990203] loop0: partition table beyond EOD, truncated [ 159.995735] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 160.000341] loop3: partition table beyond EOD, truncated [ 160.008531] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:41 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:41 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) ioctl(r1, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") socketpair(0x10, 0x805, 0x7, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000100)=0x5, 0x2) io_setup(0x5, &(0x7f00000002c0)=0x0) io_submit(r4, 0x4, &(0x7f0000001580)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0xc3d4, r3, &(0x7f0000000300)="cc66480e0a42e2152c2623df5a6a442f594fa883205bd2ec46ee6b241ef1bbbefba88b64b16e741e12f9a4f6c0096777cbd10e8cf1858daf2a66b29e63b502f030efa943641b6ac516928fd833a7eaf2afebeaa8b8702ab0edbeb1f979a4b4648bf6e78f41e892b1a4b609c9a8b6e348edb464bf2e33fbbfffe02d508b43b120e8662170da49321ae6e70a2a0d43d5b23d1ffbc28c0fda056fda66cff466a8d2972767", 0xa3, 0x7, 0x0, 0x1, r3}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x3, 0x1000, r0, &(0x7f0000000400)="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", 0x1000, 0x7, 0x0, 0x0, r2}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x7, 0xff, r0, &(0x7f0000001440)="2b43ba266212f4b520c6004e8d6b1b73677cb2693c42099addc3ad7cd683ba5c14c6c3c5f4c56bc9cea455123af7e978762f216ce4cca46240f80f2e82f8727f59f088cceb0d05c182617a41b94ab4413f62", 0x52, 0x1, 0x0, 0x0, r3}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x8, 0x2, r3, &(0x7f0000001500)="fce95b83b6f5", 0x6, 0x1, 0x0, 0x1, r2}]) socket$inet6(0xa, 0x0, 0x1f) ioprio_set$pid(0x0, 0x0, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x240000) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x3c, 0xf, 0x5b, 0x1c, 0x7, 0x5, 0x5, 0xc2}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000280)={r6, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) pipe(&(0x7f0000001700)={0xffffffffffffffff}) connect$can_bcm(r7, &(0x7f0000000200)={0x1d}, 0x10) 15:47:41 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4000000043) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xff, 0x10000) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$sndseq(r1, &(0x7f0000000040)=[{0x9, 0x5, 0xaec7, 0x7fc7316e, @time={0x77359400}, {0x2, 0x7}, {0x3, 0x80}, @addr={0x5, 0x80}}], 0x30) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x80000001}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000003c0)={r2, @in={{0x2, 0x4e23, @rand_addr=0x4}}}, 0x84) r3 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e24, 0x80000001, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1}}}, &(0x7f0000000280)=0x84) shutdown(r3, 0x2) r5 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/125) shutdown(r5, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 15:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000000c0)=""/162, &(0x7f0000000040)=0xa2) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_newaddr={0x17, 0x14, 0x835, 0x0, 0x0, {0xa}, [@IFA_ADDRESS={0x14, 0x1}, @IFA_LOCAL={0x14, 0x2}]}, 0x40}, 0x1}, 0x0) 15:47:41 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10000, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x180, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000240)={0xfff, 0x7fff, 0x6, 0x80}, 0x6) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000100)={0x0, 0x5}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000040)={0x9}) 15:47:41 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) 15:47:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000), 0x0, 0x100}]) 15:47:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='%GPL[/securitykeyringprocvboxnet1\x00', 0xffffffffffffff9c}, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000180)={[0x2, 0x5000, 0x0, 0x4], 0x401, 0x44}) getsockopt$netlink(r1, 0x10e, 0xf, &(0x7f0000000080)=""/158, &(0x7f0000000140)=0x9e) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000fcffffff0000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000080200000000030005000000e1251be011923b4b3503b8a14c0300000208dc20e08dc1a0ea863accd2ce5ea2"], 0x60}, 0x1}, 0x0) sendmsg$key(r3, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 160.582606] Dev loop3: unable to read RDB block 1 [ 160.587635] loop3: unable to read partition table [ 160.600430] loop3: partition table beyond EOD, truncated [ 160.606097] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x83fff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40003, 0x44) mmap$xdp(&(0x7f00005c6000/0x4000)=nil, 0x4000, 0x200000e, 0xc0010, r1, 0x80000000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 160.637723] Dev loop0: unable to read RDB block 1 [ 160.642781] loop0: unable to read partition table [ 160.657617] loop0: partition table beyond EOD, truncated [ 160.663212] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:41 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) 15:47:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) 15:47:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) 15:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 160.785463] Dev loop0: unable to read RDB block 1 [ 160.790451] loop0: unable to read partition table [ 160.826483] Dev loop3: unable to read RDB block 1 [ 160.831459] loop3: unable to read partition table [ 160.847139] loop0: partition table beyond EOD, truncated [ 160.852704] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 160.887694] loop3: partition table beyond EOD, truncated [ 160.893277] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 160.937979] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 15:47:42 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") shmget$private(0x0, 0x0, 0x0, &(0x7f0000b39000/0x3000)=nil) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) write$P9_RREAD(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xcd) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) mmap$binder(&(0x7f0000b3b000/0x2000)=nil, 0x2000, 0x1, 0x10, r2, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) 15:47:42 executing program 6: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, 0x20}, {}, {}, 0x0, 0x0, 0x40000000001}, {{@in=@loopback=0x7f000001, 0x0, 0x2b}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000080)={0x2, {{0xa, 0x4e20, 0x2bf, @empty, 0xf0c}}, {{0xa, 0x4e23, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x7ff}}}, 0x108) 15:47:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) 15:47:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa) mprotect(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x0) 15:47:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) 15:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1e6239f40d49b797, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x7f, "7af9c27f93e3554f13dc03ef1b4fd2a00eb9194cd8a385722c0a8ed1c52e01209d1f0cad8d87ef907cf93a13e9313cf4024a3dd42d9f47dba974d0c1b32cc41380a9dc6a7a4cd12b689fc0f59dfc464fb9fc3973f4ea1b8294e77822d7fe31f4da4a194fd9f31f8dee3b103f29ae1e5e950e63b159ec601cff0376885db03d"}, &(0x7f0000000040)=0x87) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r2, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)=0x80000001, 0x4) 15:47:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x10400, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x3, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x11, 0x80002, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) getsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x141200, 0x0) 15:47:42 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='/dev/urandom\x00'}, 0x10) ioctl$TIOCGPTPEER(r1, 0x5441, 0x9) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0xc, 0xfffffffffffffff8}], 0x1) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', 0x18, 0x0) [ 161.400658] Dev loop3: unable to read RDB block 1 [ 161.405613] loop3: unable to read partition table [ 161.413199] Dev loop0: unable to read RDB block 1 [ 161.418125] loop0: unable to read partition table [ 161.436365] loop0: partition table beyond EOD, truncated [ 161.441877] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:42 executing program 6: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0xffffffffffffffff) openat$urandom(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0xffffff9e, 0xf0ffffff00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x26, 0x7ffff, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uinput\x00', 0x302, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f00000001c0)=""/123, 0x7b}], 0x3, &(0x7f0000000280)=""/93, 0x5d, 0x7}, 0x5a}], 0x1, 0x100, &(0x7f0000000680)={0x77359400}) sendto$llc(r0, &(0x7f0000000340)="fd56b113ee5db94323df61f5855086e9f4981b2fc5b59c8f56f8b4182ad1d726c1bae545e63d665c2bfe32ed59a11b887ee3c6dc05a328a82e1813a4d4e91220a3dc6d1db1928da4e26c0518b0e6649ca952bb47e621dd7db13944ec946d37aba5087dce9168039ef92b265c293b9043163f5fad67aba28ea08c21691529ba62ea21dce97070d7e89bc3065b2caf6ae8f701c26664cb46a21946eaee2cd0ccd9083874be45da955d00da738f5c937052109a650deac764dec5ded45a463eaf6231721f59c8dc342f820024f53f87fa54cac62182636b35c33b886a339c4d288f3db0a61fbc77900a88108cdd189863b887ef1a0b327dbd60b9036fefcb6a8b65e6b6d4db0afef17be384c0bf6b12dd45eeeefee78798dd1955dd8b0688", 0x11d, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x3, 0x2, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) 15:47:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100, 0x262101) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x1, 0x6a, &(0x7f00000000c0)="6231dacedfda800a86e43c8cab8169cd7269da410f354bfd04eed11a39ebd1e16a380386622b4e8a88b729c4bac6564b2c785f3275a1ff72b36be37e0494eb72f962fa2c7dcbd1ef70a828cdac3d95c644708eb9c90deba85a1bad0b2751aed152a7a0c7e17ed35545fc"}) [ 161.461008] loop3: partition table beyond EOD, truncated [ 161.466664] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) 15:47:42 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f000070cf93)="04b21a16", 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)=@ethernet={0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="fec21b9f19c23f35b80049ba96af71cc1a6206e6da958278ce13f4cb04061e4634684ab98453cf630deb4fbe0ee2a3450dc76c", 0x33}, {&(0x7f0000000140)="24ea9010103048400895bbe033686b47944de51535d4e5b4f4bab1693d2cf8c77005bd0120ed04fe79022daee38313c29db6f90d8d6829dc5802b1c854", 0x3d}], 0x2, &(0x7f00000001c0)=[{0x88, 0xff, 0x7ff, "0c5571e8302e8dc9767f6adb54d53f14f799d2863c4694a38d3cd7ab9a5ae637693ffb2700b3afde1efa65d9ba632577ab44f07012dbc2302c74ebe48ef2df553d89df97df42f0b5c0da3990c6098d06c0a5727d038999e4966f587a6aed24f33af3b54ea5bfd3f35a8f6a41eb6e325090e8ad6181"}, {0xa0, 0x11f, 0x9, "adf879e3f8587575dcb7a9ba1b3d3b3e1dd7238ae098bc0a4511888ec36f106e74de70051495697676b6bfe465f48c25a8dc278d075f582809b0a562939ae9844af8360c259243e87418a199b4da4ef2d075cbd6a9626a22a10e3e00b20b0fa3f26596d686872421e6155ea3d27eb272e2e07541327729ca8b848371908dfd45331aae5060951dfc0d1b"}, {0xd0, 0x10b, 0x2, "34fe0d83f6684e8a014f0e10fd64d83029ec6642431b3191bc323515f211121a2741eefd4725a29892c209e33ca0ee7d8773b8c9300e846e09e5c98f11b7ce30bf7f790ab17e6efceca629e907efd093e89237811b66320e66e8db1db0c1ed23c14551048b6b491e06de20d78328473e94ea54b5933e424ded7d78a23930bf982456cb3e4e38bcf0f1a1001220db49a71a02bc980e5707afa1d4803086acf577a58ecfb18e093fda747195d8fdd183940d505e401d916f209eb8864fb8b5"}], 0x1f8, 0x24000000}, 0x24000000) socket$inet_icmp_raw(0x2, 0x3, 0x1) chdir(&(0x7f0000000000)='./file0\x00') 15:47:42 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0xc100) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x585}], 0x1, &(0x7f0000003b40)}, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5dd}, 0x1c) [ 161.589287] Dev loop0: unable to read RDB block 1 [ 161.594272] loop0: unable to read partition table [ 161.626632] loop0: partition table beyond EOD, truncated [ 161.632202] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:43 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000a", 0x77, 0x100}]) 15:47:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:43 executing program 2: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) sched_setaffinity(r0, 0xfef5, &(0x7f0000da3000)) r1 = userfaultfd(0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) connect(r2, &(0x7f0000000340)=@rc={0x1f, {0x4, 0x2, 0xe0c, 0xffff, 0x401, 0x200000000}, 0x2}, 0x80) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') mkdir(&(0x7f0000000040)='./control/file1\x00', 0x0) getxattr(&(0x7f0000000100)='./control/file1\x00', &(0x7f00000014c0)=ANY=[], &(0x7f00000004c0)=""/4096, 0x1000) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000240)='./control/file0\x00', 0xf7, 0x1, &(0x7f0000000300)=[{&(0x7f0000000280)="ac8465b6e8f1df5a41c4648f9bb0e350d65191b270a5ae9fd9123b9185efff11844d104304fb75dc5442331f7235059e344dcdb137f5", 0x36}], 0x1000084, 0x0) close(r1) 15:47:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_cache\x00') fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x100000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap', 0x2c}, {@dfltgid={'dfltgid', 0x3d, r3}, 0x2c}, {@aname={'aname', 0x3d, 'wlan0vmnet0selfeth1:--\x00'}, 0x2c}, {@cachetag={'cachetag', 0x3d, '/dev/kvm\x00'}, 0x2c}, {@msize={'msize', 0x3d, 0x6}, 0x2c}, {@fscache='fscache', 0x2c}, {@fscache='fscache', 0x2c}]}}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ip6tnl0\x00', 0x1}) 15:47:43 executing program 5: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r2 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380), 0x217, &(0x7f0000000180)}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e21, @rand_addr=0x6}, 0x10) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfffffc47}, 0x2) 15:47:43 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) 15:47:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000009ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00004edfd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper={0x630b}]}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000002540)=ANY=[@ANYBLOB="5507576f07747a6187bc6cc08e669e010a9e321f743aa60a8acb81bc89d242afa2d1d5cdb1cf2e1aa9c8177841d8e5388673baa322500e8abc044101beee9045f049997f2c2917297dcf66825d3e3225a9085ddbc8ab66b9df2b2b7897e8bd679b77f37f203d2e69cee84910d167b4509ea284597daa82fdc0e9ee1ece0cfaca8b27c7633b49cbdb3f1d79d72644acdf50a949c096d693c6d2757b876d8727c46ea1f9d3a0edae66c8"], 0x0, 0x0, &(0x7f00004ee64e)}) dup3(r2, r1, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f000000efd0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfdfd, &(0x7f00000001c0)="ef"}) readv(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)=""/138, 0x8a}, {&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f00000003c0)=""/177, 0xb1}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000000)=""/94, 0x5e}, {&(0x7f0000000200)=""/89, 0x59}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)}], 0x8) 15:47:43 executing program 5: getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0xb, "067f785a86ed643ddfe0ee"}, &(0x7f0000000040)=0x2f) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000003c0), 0x4) [ 162.350324] Dev loop0: unable to read RDB block 1 [ 162.355371] loop0: unable to read partition table [ 162.362917] Dev loop3: unable to read RDB block 1 [ 162.367876] loop3: unable to read partition table [ 162.386180] loop0: partition table beyond EOD, truncated [ 162.391840] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 162.402620] loop3: partition table beyond EOD, truncated [ 162.408216] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:43 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) 15:47:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) [ 162.452269] binder: 11606:11607 ERROR: BC_REGISTER_LOOPER called without request [ 162.485437] Dev loop0: unable to read RDB block 1 [ 162.490454] loop0: unable to read partition table 15:47:43 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x100) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@rand_addr}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}, 0x1}, 0x0) r1 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x13, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x58, 0x0, &(0x7f0000000140)=[@free_buffer={0x40086303, r1}, @reply_sg={0x40486312, {{0x1, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000080), &(0x7f00000000c0)=[0x78, 0x40, 0x30, 0x28, 0x38, 0x30, 0x18, 0x38]}, 0x7ff}}], 0x16, 0x0, &(0x7f00000001c0)="c430c18c305eb13011f6181171ef7ac334935f5c2ca7"}) 15:47:43 executing program 1: r0 = semget$private(0x0, 0x2, 0x410) semtimedop(r0, &(0x7f0000000040)=[{0x4, 0x9, 0x1800}, {0x7, 0x6, 0x800}, {0x1, 0x4, 0x800}, {0x0, 0x10000, 0x1800}], 0x4, &(0x7f00000000c0)={0x77359400}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 162.500631] loop0: partition table beyond EOD, truncated [ 162.506233] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 162.508708] binder: 11606:11607 unknown command 1867974485 [ 162.527404] binder: 11606:11607 ioctl c0306201 20007000 returned -22 [ 162.535721] Dev loop3: unable to read RDB block 1 [ 162.540677] loop3: unable to read partition table [ 162.545928] loop3: partition table beyond EOD, truncated 15:47:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:43 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) [ 162.551491] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 162.628492] Dev loop0: unable to read RDB block 1 [ 162.633466] loop0: unable to read partition table [ 162.658314] loop0: partition table beyond EOD, truncated [ 162.663922] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:44 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000000000"], 0x6b) 15:47:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0"], &(0x7f0000000340)=0x1) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f0000000100)="df28f2af0f94583cbaf80c66b8327f3c8b66efbafc0ced2e0f01c80f6a02ba4000b001ee0f060f01c80f07", 0x2b}], 0x1, 0x0, &(0x7f0000000180), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2(&(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:47:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) [ 163.243142] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 163.271247] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 15:47:44 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) r1 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000040)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x80800) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='time\x00\x00\x00t=0x0000000000000000,\x00\x00\x00\x00']) 15:47:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x800, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getgid() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:44 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) [ 163.306632] Dev loop3: unable to read RDB block 1 [ 163.311611] loop3: unable to read partition table [ 163.331131] loop3: partition table beyond EOD, truncated [ 163.336771] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 163.370612] binder: BINDER_SET_CONTEXT_MGR already set [ 163.378460] Dev loop0: unable to read RDB block 1 [ 163.383442] loop0: unable to read partition table [ 163.392191] binder: 11606:11676 ERROR: BC_REGISTER_LOOPER called without request [ 163.403099] binder: 11606:11681 unknown command 1867974485 [ 163.408963] binder: 11606:11681 ioctl c0306201 20007000 returned -22 [ 163.415470] binder: 11606:11672 ioctl 40046207 0 returned -16 [ 163.421540] loop0: partition table beyond EOD, truncated [ 163.427107] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:44 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) epoll_create(0x5) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x7ff, 0x7}) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x34000}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_lifetime={0x4, 0x4}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xb0}, 0x1}, 0x0) 15:47:44 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101146, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d000000000100"]) 15:47:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a", 0xb3, 0x100}]) 15:47:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0xfe4b, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c80, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) 15:47:44 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) [ 163.487127] FAT-fs (loop2): Unrecognized mount option "time" or missing value 15:47:44 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x400000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)) mlockall(0x5) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x6}}, 0x18) munlockall() openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x42) ioctl$TCFLSH(r0, 0x540b, 0xc3e) 15:47:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000), 0xc) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x101, 0x44000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) fcntl$setlease(r0, 0x400, 0x1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000280)={0x90, 0x0, 0x5, {0x4, 0x3, 0x40, 0x400, 0x8, 0xffffffff, {0x2, 0x80000001, 0x8, 0x4, 0x4, 0x5, 0x2, 0x3, 0x5, 0x80000001, 0x5, r2, r3, 0x2, 0x80}}}, 0x90) 15:47:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 163.563441] Dev loop0: unable to read RDB block 1 [ 163.568458] loop0: unable to read partition table [ 163.573637] Dev loop3: unable to read RDB block 1 [ 163.578625] loop3: unable to read partition table [ 163.596760] loop0: partition table beyond EOD, truncated [ 163.602365] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 163.618207] loop3: partition table beyond EOD, truncated [ 163.623815] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:45 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) 15:47:45 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) 15:47:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'bond0\x00', 0x2}) 15:47:45 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) 15:47:45 executing program 6: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0/file0/file0\x00', &(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f000000c000)="72616de17300", 0x0, &(0x7f0000000180)) symlink(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)='./file0/file0\x00') r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") umount2(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0) 15:47:45 executing program 5: socketpair(0x2, 0x80001, 0x394a4e9a, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x103, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000040)=0x8000) 15:47:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:45 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@dir_umask={'dir_umask', 0x3d, 0x3000000000000000}, 0x2c}]}) r0 = dup(0xffffffffffffff9c) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000240)=""/113, &(0x7f0000000100)=0x71) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000540)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) capset(&(0x7f00000004c0)={0x399f1736, r2}, &(0x7f0000000500)={0x6, 0x1, 0xc5d3, 0xfab, 0x3ff, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x6}}, 0x18) inotify_add_watch(r0, &(0x7f0000000580)='./file1\x00', 0x20000030) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) bind$rds(r0, &(0x7f00000005c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x1c, 0x1, @in={0x2, 0x4e23, @rand_addr}}}, 0xa0) 15:47:45 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x600, 0x5, 0x1}, 0x2c) rt_sigtimedwait(&(0x7f0000000000)={0x200000000004}, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x1c9c380}, 0x1e4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000140)=0x40, &(0x7f0000000240)=0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000640), &(0x7f00000006c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 15:47:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40080, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x3, r2, 0x1}) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000d7f000), &(0x7f0000000000)=0x4) [ 164.251596] hfs: dir_umask requires a value [ 164.256052] hfs: unable to parse mount options [ 164.267125] Dev loop0: unable to read RDB block 1 [ 164.267179] Dev loop3: unable to read RDB block 1 [ 164.272088] loop0: unable to read partition table [ 164.276980] loop3: unable to read partition table [ 164.287048] loop3: partition table beyond EOD, truncated [ 164.292569] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x305000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x3ff, 0x100000000, 0x1000, 0x1, 0xa35}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 164.349337] loop0: partition table beyond EOD, truncated [ 164.354943] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 164.386726] hfs: dir_umask requires a value [ 164.391152] hfs: unable to parse mount options 15:47:45 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) 15:47:45 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000000c0)={0x8001, 0x9, 0xd9b6, 0x0, 0x0, [], [], [], 0x101, 0x64c4}) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150006000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1, 0x40) 15:47:45 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000300)={{0x2, 0x0, @loopback=0x7f000001}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, "00000080000001000000007000b12400"}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x204000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000380)={'filter\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000080)="0803d98a8e3a42ff1b6fdafea43f2bed86cbf3a378107458e5cf963468fc6da0934bcbdb782fe28ff487e0a94108484f9cfae1588f89ea3a532603639cceeb1bc45a0dcfde050369e0497d26f668a37d1623470b0447d527f09a6c548953ba83bbba5c05a81c61d61bfdff0809aff952d6f9ea345a5dab790b0b4591c2ffb521825def03a3b1aa748508988ddbdca97e9936c89d60c6a34c2d80c0a0ab953da110273bd4dd5d8ebe20c4953077aeea4ec0d74f85e0837aead0982cfdb3fd192ab83fdc010d6e45185dbbe31d81b8f023b59775d22810ed", 0xd7, 0xfffffffffffffff8) keyctl$clear(0x7, r1) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x4300) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000480)) syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x82000) 15:47:45 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000003980)=[{{&(0x7f0000000180)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/21, 0x15}, {&(0x7f00000002c0)=""/230, 0xe6}], 0x2, &(0x7f0000000400)=""/245, 0xf5, 0x7}, 0x4}, {{&(0x7f0000000500)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000580)=""/144, 0x90}, {&(0x7f0000000640)=""/4, 0x4}, {&(0x7f0000000680)=""/48, 0x30}, {&(0x7f00000006c0)=""/181, 0xb5}], 0x4, &(0x7f00000007c0)=""/4096, 0x1000, 0xfffffffffffffffb}, 0x6}, {{&(0x7f00000017c0)=@llc, 0x80, &(0x7f0000002940)=[{&(0x7f0000001840)=""/136, 0x88}, {&(0x7f0000001900)=""/53, 0x35}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x3, &(0x7f0000002980)=""/4096, 0x1000, 0xffffffffffffffff}, 0x1f}], 0x3, 0x40, &(0x7f0000003a40)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000003a80)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, {0x307, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x60, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth1_to_bridge\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000200)="8270", &(0x7f0000000080)=""/98}, 0x18) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x3034c0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x22, 0x16f}, 0xb) [ 164.514468] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 164.534624] netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'. [ 164.543893] Dev loop3: unable to read RDB block 1 [ 164.548847] loop3: unable to read partition table [ 164.555577] loop3: partition table beyond EOD, truncated [ 164.561244] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 164.561987] netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'. [ 164.580857] kernel msg: ebtables bug: please report to author: Wrong nr of counters 15:47:46 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000,\x00']) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0x49, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x49) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) 15:47:46 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) 15:47:46 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) 15:47:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmmsg(r0, &(0x7f0000001c80)=[{{&(0x7f00000000c0)=@ll, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/99, 0x63}, {&(0x7f0000000140)=""/22, 0x16}, {&(0x7f0000000280)=""/46, 0x2e}, {&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/97, 0x61}], 0x6, &(0x7f00000004c0)=""/211, 0xd3, 0x7}, 0xcd04}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000005c0)=""/179, 0xb3}, {&(0x7f0000000680)=""/51, 0x33}, {&(0x7f00000006c0)=""/44, 0x2c}, {&(0x7f0000000700)=""/213, 0xd5}, {&(0x7f0000000800)=""/131, 0x83}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/184, 0xb8}, {&(0x7f0000001980)=""/32, 0x20}], 0x8, 0x0, 0x0, 0x8001}, 0x2}, {{&(0x7f0000001a40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)=""/206, 0xce}], 0x1, &(0x7f0000001c00)=""/125, 0x7d, 0x8001}, 0x10000}], 0x3, 0x120, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001dc0)={0x0, 0x54, &(0x7f0000001d40)=[@in6={0xa, 0x4e24, 0xffffffffffffffc1, @dev={0xfe, 0x80, [], 0x1c}, 0x1}, @in6={0xa, 0x4e22, 0x2, @loopback={0x0, 0x1}, 0x9ac5}, @in6={0xa, 0x4e24, 0x6, @empty, 0xfffffffffffffff7}]}, &(0x7f0000001e00)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000001ec0)={r2, 0x48, &(0x7f0000001e40)=[@in6={0xa, 0x4e23, 0x20, @remote={0xfe, 0x80, [], 0xbb}, 0x4b4d317a}, @in6={0xa, 0x4e24, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x200}, @in={0x2, 0x4e20, @multicast2=0xe0000002}]}, &(0x7f0000001f00)=0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={"66696c7465720200", 0x4}, 0x68) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0xaaba, 0x800) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000001c0)={0x32, 0x6, 0x0, {0x4, 0x3, 0x9, 0x0, '/dev/sg#\x00'}}, 0x32) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x9, 0x80) r2 = semget(0x2, 0x0, 0x40) semtimedop(r2, &(0x7f0000000100)=[{0x7, 0x166, 0x1800}], 0x1, &(0x7f0000000140)) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000200)={'teql0\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300001600000000000000000000000600000051c3c1e7743a4092eefed90abecc4a0040030000000000000000000000c6e62ab44f12656f00000000000005000600000000000a00000000000000000000000000000000000000000000668980fcaf0000000000000000000400040000000d000000000000000000000000000000000000000000000000000200010000000000000000000000000005000500000000000a00000000000000fe8000000000000000"], 0xb0}, 0x1}, 0x0) 15:47:46 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc", 0xd1, 0x100}]) 15:47:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:46 executing program 6: r0 = socket(0x2, 0x80000000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/117, &(0x7f0000000280)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000000c0)='\x00'}, 0x10) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000100)=""/189) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = gettid() setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x1, 'bridge_slave_0\x00', 0x2}, 0x18) ptrace$getregset(0x4204, r3, 0x207, &(0x7f00000001c0)={&(0x7f0000000440)=""/239, 0xef}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000340)=0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001940)={'ip_vti0\x00'}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001980)={@remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, 0x3, 0x7f, 0x3, 0x100, 0x0, 0x200}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = eventfd(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000180)={r7, 0x0, 0x2, r6}) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x2, 0x2, r6}) [ 165.163899] 9pnet_virtio: no channels available for device (null) [ 165.191311] Dev loop3: unable to read RDB block 1 [ 165.196251] 9pnet_virtio: no channels available for device (null) [ 165.202584] loop3: unable to read partition table 15:47:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:47:46 executing program 4 (fault-call:11 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 165.215541] Dev loop0: unable to read RDB block 1 [ 165.220582] loop0: unable to read partition table [ 165.239972] loop0: partition table beyond EOD, truncated [ 165.245593] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 165.249611] loop3: partition table beyond EOD, truncated [ 165.258447] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:46 executing program 5: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbff, 0x48000000}, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r2, 0xfffffffffffffff9, 0x2) accept$packet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) [ 165.280290] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 2, id = 0 15:47:46 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) [ 165.347285] FAULT_INJECTION: forcing a failure. [ 165.347285] name failslab, interval 1, probability 0, space 0, times 0 [ 165.358649] CPU: 0 PID: 11845 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 165.367058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.376420] Call Trace: [ 165.379020] dump_stack+0x1c9/0x2b4 [ 165.382659] ? dump_stack_print_info.cold.2+0x52/0x52 [ 165.387867] ? perf_trace_lock+0xde/0x920 [ 165.392033] should_fail.cold.4+0xa/0x11 15:47:46 executing program 5: socketpair(0x1e, 0x5, 0x0, &(0x7f000026eff8)={0x0, 0x0}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0xffffffff, 0x8, 0x20, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ifb0\x00'}) shutdown(r0, 0x2) recvfrom$llc(r1, &(0x7f0000000000)=""/45, 0x2d, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000005c0)={@mcast1, 0x0}, &(0x7f0000000600)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000640)={@remote={0xfe, 0x80, [], 0xbb}, r2}, 0x14) 15:47:46 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) [ 165.396110] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 165.401237] ? __f_unlock_pos+0x19/0x20 [ 165.405233] ? lock_downgrade+0x8f0/0x8f0 [ 165.409400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.414955] ? proc_fail_nth_write+0x9e/0x210 [ 165.419469] ? lock_acquire+0x1e4/0x540 [ 165.423465] ? lock_acquire+0x1e4/0x540 [ 165.427453] ? fs_reclaim_acquire+0x20/0x20 [ 165.431796] ? lock_downgrade+0x8f0/0x8f0 [ 165.435961] ? check_same_owner+0x340/0x340 [ 165.440294] ? fsnotify_first_mark+0x350/0x350 15:47:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x8000000000000010, 0x803, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8080, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f7a65726f00202f6465762f7a65726f000a4888ad8f5cd8b77dfc176237164e4aefe7d4af9bb19b432e0d0ca57ce11cc41acb1c95cc3133f2d8391e4e1e4f37dbef825aa8cea73cb028a5e86fc253bfcfc827791df60626814f3a3ff79651040f9d9e32e81b8b3a9a0f12d981830d9dc87fc4b1f61fd8593a56b567d275548bd7dcc16ccec4bb6a213b"], 0xa9) accept$inet6(r0, 0x0, &(0x7f0000000240)) sendto(r1, &(0x7f0000000000)="120000005200df9eaf4af5843bdb000000ff", 0x12, 0x0, 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000001c0)=0x3, &(0x7f0000000200)=0x4) recvmmsg(r1, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000004b00), 0x0, &(0x7f0000004b80)=""/100, 0x64}}, {{&(0x7f0000004c00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000004f80), 0x0, &(0x7f0000005000)=""/35, 0x23}}, {{&(0x7f0000005040)=@llc, 0x80, &(0x7f0000000040)}}], 0x3, 0x0, &(0x7f0000005580)={0x0, 0x1c9c380}) [ 165.444900] ? rcu_note_context_switch+0x730/0x730 [ 165.449848] ? fsnotify+0x14e0/0x14e0 [ 165.453663] __should_failslab+0x124/0x180 [ 165.457918] should_failslab+0x9/0x14 [ 165.461734] __kmalloc_track_caller+0x2c4/0x760 [ 165.466413] ? strncpy_from_user+0x510/0x510 [ 165.470837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.476393] ? strndup_user+0x77/0xd0 [ 165.480211] memdup_user+0x2c/0xa0 [ 165.483773] strndup_user+0x77/0xd0 [ 165.487414] ksys_mount+0x3c/0x140 [ 165.490976] __x64_sys_mount+0xbe/0x150 15:47:46 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='-\x00', 0xffffffffffffff9c}, 0x10) sendto$packet(r0, &(0x7f00000001c0), 0x0, 0x4010, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r2, &(0x7f00000002c0)="db", 0x1, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom(r2, &(0x7f0000000040)=""/98, 0x62, 0x21, &(0x7f0000000140)=@nl=@unspec, 0x70a000) 15:47:46 executing program 5: syz_emit_ethernet(0x8ba, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "0ad5ea", 0x884, 0x0, 0x0, @empty, @local={0xfe, 0x80, [], 0xaa}, {[@dstopts={0x0, 0x3, [], [@jumbo={0xc2, 0x4}, @hao={0xc9, 0x10, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}]}], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x669, 0x0, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "0e1a58420fea96cb160920dbcc3728c8aa955987ebdabeb1c7447488b0ea91e1f228232bf76c83d7b7c2e574548e45c91e658aba7dc503893c030f8be4399b322c0878e458a2e85cbc6e9fb12231a3408421201983f9348cbd446073a3c7861824d1fdcfdf96150ce5c60e0ab03eb06837ea9d96bf2c8e1afcc439290bbf93019bbb8f1ec0991a5d68514c858e8a305ebd24693683f072cc7fc26bc0596958bc847e8f736a39d78249f8f5463f89bb72beec5ead5c62f03360080081f4c208ec52696d7377f6a6835be4aa46502ffa2c27c5f2863e07e27cbffc68eb2e9b2e623dc760f4f355bd7408a8667840ac76425952c4fe4b5f87"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "cd4a8a4f4e03523768d9fd77d89fd56e9d5a75e883c95a8ec04aea3465cda80290a4179f6f4d57566ec6745fead32ab217bb30debdb30ccf950e522b393ec5fc6d8a105421ed4c672d88595ce7d33cfbeeeef5399d9b8b9c08015f13b35a0690a77eb6f51afaa6152e02"}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558, 0x0, "227187a4d046136259dffa6ee05e2ed17b493f0014d361739db6b790a32acfd080e8a61ed1662728f2305b1368caa927341e4efe0f025a6157a1184c8f6057b25edc1831c5fbd3c791eb834c304ddf55b09afbebed04"}}}}}}}, &(0x7f0000001440)={0x0, 0x3, [0x0, 0xffff]}) pipe2(&(0x7f0000000940)={0xffffffffffffffff}, 0x4800) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$sequencer(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer\x00', 0x40, 0x0) [ 165.494972] do_syscall_64+0x1b9/0x820 [ 165.498878] ? syscall_slow_exit_work+0x500/0x500 [ 165.503755] ? syscall_return_slowpath+0x5e0/0x5e0 [ 165.508703] ? syscall_return_slowpath+0x31d/0x5e0 [ 165.513650] ? prepare_exit_to_usermode+0x291/0x3b0 [ 165.518686] ? perf_trace_sys_enter+0xb10/0xb10 [ 165.523369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 165.528232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.533429] RIP: 0033:0x455ab9 15:47:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000040)="31a84ca1c5da5532270dad2d07917a8b8d85964bbf34f256f88e12e0decb41a6b0756b18dc1cad40ab95960fecdcd61c0ce5b03aad66d7e48a001c1cd1b5e4069e1bdd82698234cb9c85d52c2bcfbcd9d449d37b") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff02000001000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000004c001200726663343130362867676d2861657329290000000000000000000000000000dfffffffffffffff0000000000000000000000000000000000000000000000000000000000600000000000000000000000000000"], 0x13c}, 0x1}, 0x0) [ 165.536613] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.555860] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 165.563581] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 165.570862] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 165.578153] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 165.580506] netlink: 76 bytes leftover after parsing attributes in process `syz-executor5'. 15:47:46 executing program 4 (fault-call:11 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 165.585433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 165.585441] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000000 [ 165.619498] Dev loop0: unable to read RDB block 1 [ 165.620302] netlink: 76 bytes leftover after parsing attributes in process `syz-executor5'. [ 165.624466] loop0: unable to read partition table [ 165.625690] loop0: partition table beyond EOD, truncated [ 165.641833] Dev loop3: unable to read RDB block 1 [ 165.643560] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 165.646460] IPVS: length: 8 != 216 [ 165.648524] loop3: unable to read partition table [ 165.665227] loop3: partition table beyond EOD, truncated [ 165.670761] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 165.900424] FAULT_INJECTION: forcing a failure. [ 165.900424] name failslab, interval 1, probability 0, space 0, times 0 [ 165.911748] CPU: 1 PID: 11889 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 165.920141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.929480] Call Trace: [ 165.932059] dump_stack+0x1c9/0x2b4 [ 165.935719] ? dump_stack_print_info.cold.2+0x52/0x52 [ 165.940903] ? __kernel_text_address+0xd/0x40 [ 165.945384] ? unwind_get_return_address+0x61/0xa0 [ 165.950301] should_fail.cold.4+0xa/0x11 [ 165.954350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 165.959443] ? save_stack+0xa9/0xd0 [ 165.963056] ? save_stack+0x43/0xd0 [ 165.966673] ? kasan_kmalloc+0xc4/0xe0 [ 165.970547] ? __kmalloc_track_caller+0x14a/0x760 [ 165.975380] ? memdup_user+0x2c/0xa0 [ 165.979080] ? strndup_user+0x77/0xd0 [ 165.982866] ? ksys_mount+0x3c/0x140 [ 165.986567] ? do_syscall_64+0x1b9/0x820 [ 165.990618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.996005] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.001539] ? proc_fail_nth_write+0x9e/0x210 [ 166.006027] ? proc_cwd_link+0x1d0/0x1d0 [ 166.010077] ? lock_acquire+0x1e4/0x540 [ 166.014040] ? lock_acquire+0x1e4/0x540 [ 166.018003] ? fs_reclaim_acquire+0x20/0x20 [ 166.022317] ? lock_downgrade+0x8f0/0x8f0 [ 166.026457] ? check_same_owner+0x340/0x340 [ 166.030766] ? lock_release+0xa30/0xa30 [ 166.034728] ? rcu_note_context_switch+0x730/0x730 [ 166.039648] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 166.044662] __should_failslab+0x124/0x180 [ 166.048895] should_failslab+0x9/0x14 [ 166.052686] __kmalloc_track_caller+0x2c4/0x760 [ 166.057362] ? strncpy_from_user+0x510/0x510 [ 166.061760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.067288] ? strndup_user+0x77/0xd0 [ 166.071080] memdup_user+0x2c/0xa0 [ 166.074611] strndup_user+0x77/0xd0 [ 166.078253] ksys_mount+0x73/0x140 [ 166.081781] __x64_sys_mount+0xbe/0x150 [ 166.085764] do_syscall_64+0x1b9/0x820 [ 166.089654] ? syscall_return_slowpath+0x5e0/0x5e0 [ 166.094575] ? syscall_return_slowpath+0x31d/0x5e0 [ 166.099497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 166.104502] ? prepare_exit_to_usermode+0x291/0x3b0 [ 166.109506] ? perf_trace_sys_enter+0xb10/0xb10 [ 166.114180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.119018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.124194] RIP: 0033:0x455ab9 [ 166.127364] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.146544] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 166.154247] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 166.161505] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 166.168763] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 166.176022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 166.183280] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000001 15:47:47 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) 15:47:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x82, 0x0) socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0xb13, 0x2000) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x6, 0x0, @thr={&(0x7f00000000c0)="b7a2b471431694c97d5221304b4e7a98af0f80f47b40599f8636db863930e2431610ab533ccbaae467967c2d316ad4ded742af23ff56d5db744ae1558f15983cc59858a6ae94dd9eb146a25a95725f55d41a2b9f1c3d40090943ef4d53f13e31198089cfee969283cb990fa567e71ff29bc69b86454041f178f3e4082c92e9db716b4548e84c251f2b129f16ccfe2b60eb29c459", &(0x7f0000000200)="97293d619831c460156f6552558adebe3f2908c198a0edbaa60a6cc7e991ed0714e40362cbf138e29d2244b765ee737e021a2297e9a029a0b04c7084c4fcf60e4c7f37ee65226510bb1487c4f22ab61a110e936a914081f36180aa8e"}}, &(0x7f0000000280)=0x0) timer_delete(r2) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x6, 0x1ff, 0x1}}, 0x30) 15:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x3, 0x87) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000001}, 0xc) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r3 = getpgid(0x0) waitid(0x3, r3, &(0x7f0000000040), 0x4, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x2b}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x0, 0xf0d0}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) 15:47:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x204, &(0x7f0000000180)="025cc83d6d345f8f762070c38df61ae9f817f704123695eeaf5e23fa93c3316e25f29a615fb0e7aa5a34b9b0b320b37055658c13055f2bc803e095523883105ee9250919edbb309ee5978df4b972eaf16a122ccfee09433a1461e5ac8132b49d1e84885a9e82f5f552ff53") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x2f84) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="03000000000000000000000000000000000000000000002a1f0000000000000000000000000000000000000000000000"]}) close(r2) close(r1) 15:47:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) 15:47:47 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) 15:47:47 executing program 6: r0 = socket(0x10, 0x80002, 0x0) recvfrom$inet(r0, &(0x7f0000000000)=""/234, 0xea, 0x0, &(0x7f0000000100)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2}, {0x0, @random="1574e012876f"}, 0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth1\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x7fff, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000240)={{0x3, 0x3, 0x5, 0x0, 0xa6}}) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 15:47:47 executing program 4 (fault-call:11 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 166.345868] Dev loop3: unable to read RDB block 1 [ 166.349201] FAULT_INJECTION: forcing a failure. [ 166.349201] name failslab, interval 1, probability 0, space 0, times 0 [ 166.350854] loop3: unable to read partition table [ 166.362114] CPU: 1 PID: 11902 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 166.375430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.378415] loop3: partition table beyond EOD, [ 166.384787] Call Trace: [ 166.384811] dump_stack+0x1c9/0x2b4 [ 166.384829] ? dump_stack_print_info.cold.2+0x52/0x52 [ 166.384845] ? __kernel_text_address+0xd/0x40 [ 166.384863] ? perf_trace_lock+0xde/0x920 [ 166.384879] should_fail.cold.4+0xa/0x11 [ 166.384898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 166.389592] truncated [ 166.392140] ? zap_class+0x740/0x740 [ 166.392158] ? save_stack+0xa9/0xd0 [ 166.392177] ? kasan_kmalloc+0xc4/0xe0 [ 166.395808] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 166.400956] ? __kmalloc_track_caller+0x14a/0x760 [ 166.400969] ? memdup_user+0x2c/0xa0 [ 166.400986] ? strndup_user+0x77/0xd0 [ 166.451801] ? ksys_mount+0x73/0x140 [ 166.455504] ? __x64_sys_mount+0xbe/0x150 [ 166.459640] ? do_syscall_64+0x1b9/0x820 [ 166.463780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.469307] ? proc_fail_nth_write+0x9e/0x210 [ 166.473797] ? lock_acquire+0x1e4/0x540 [ 166.477768] ? lock_acquire+0x1e4/0x540 [ 166.481730] ? fs_reclaim_acquire+0x20/0x20 [ 166.486042] ? lock_downgrade+0x8f0/0x8f0 [ 166.490185] ? check_same_owner+0x340/0x340 [ 166.494495] ? lock_release+0xa30/0xa30 [ 166.498461] ? check_same_owner+0x340/0x340 [ 166.502775] ? rcu_note_context_switch+0x730/0x730 [ 166.507716] ? __check_object_size+0xa3/0x5d7 [ 166.512203] __should_failslab+0x124/0x180 [ 166.516431] should_failslab+0x9/0x14 [ 166.520224] kmem_cache_alloc_trace+0x2cb/0x780 [ 166.524887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.530416] ? _copy_from_user+0xdf/0x150 [ 166.534562] copy_mount_options+0x5f/0x380 [ 166.538789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.544321] ksys_mount+0xd0/0x140 [ 166.547855] __x64_sys_mount+0xbe/0x150 [ 166.551821] do_syscall_64+0x1b9/0x820 [ 166.555699] ? finish_task_switch+0x1d3/0x870 [ 166.560187] ? syscall_return_slowpath+0x5e0/0x5e0 [ 166.565108] ? syscall_return_slowpath+0x31d/0x5e0 [ 166.570033] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 166.575041] ? prepare_exit_to_usermode+0x291/0x3b0 [ 166.580049] ? perf_trace_sys_enter+0xb10/0xb10 [ 166.584711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.589555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.594734] RIP: 0033:0x455ab9 [ 166.597906] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.617205] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 166.624909] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 166.632172] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 166.639430] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 166.646689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 166.653946] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000002 [ 166.661834] Dev loop0: unable to read RDB block 1 [ 166.666881] loop0: unable to read partition table 15:47:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x9, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x10000000000000, 0x9, 0x0, "08c2f339fa0ba3df968addae5c66cbeeea8be8ddb1b647155e5a9a05dea6a27e826969169351949f3a533adcd97dc489df0a30e27c1c3a7edac56e45348028588f6d9e0f6a8e9eb81d0ce14e6c0dc5a0"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240)=0x2, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 15:47:47 executing program 4 (fault-call:11 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:47 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f618", 0xe0, 0x100}]) 15:47:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) [ 166.692478] loop0: partition table beyond EOD, truncated [ 166.698079] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000219000/0x600000)=nil, 0x600000, 0x1000000) getsockopt$inet6_mreq(r1, 0x29, 0x1a, &(0x7f0000000040)={@mcast1}, &(0x7f00000000c0)=0x14) [ 166.784378] FAULT_INJECTION: forcing a failure. [ 166.784378] name failslab, interval 1, probability 0, space 0, times 0 [ 166.795785] CPU: 0 PID: 11927 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 166.804193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.813544] Call Trace: [ 166.816134] dump_stack+0x1c9/0x2b4 [ 166.819759] ? dump_stack_print_info.cold.2+0x52/0x52 [ 166.824945] ? trace_hardirqs_on+0xd/0x10 [ 166.829091] should_fail.cold.4+0xa/0x11 [ 166.833145] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 166.839012] ? lock_repin_lock+0x430/0x430 [ 166.843243] ? kasan_check_write+0x14/0x20 [ 166.847471] ? __schedule+0x884/0x1ed0 [ 166.851351] ? __sched_text_start+0x8/0x8 [ 166.855493] ? kernel_text_address+0x79/0xf0 [ 166.859898] ? __kernel_text_address+0xd/0x40 [ 166.864389] ? lock_acquire+0x1e4/0x540 [ 166.868365] ? fs_reclaim_acquire+0x20/0x20 [ 166.872680] ? lock_downgrade+0x8f0/0x8f0 [ 166.876825] ? check_same_owner+0x340/0x340 [ 166.881155] ? save_stack+0xa9/0xd0 [ 166.884794] ? kasan_kmalloc+0xc4/0xe0 [ 166.888673] ? kmem_cache_alloc_trace+0x152/0x780 [ 166.893509] ? copy_mount_options+0x5f/0x380 [ 166.897914] __should_failslab+0x124/0x180 [ 166.902143] should_failslab+0x9/0x14 [ 166.905934] kmem_cache_alloc+0x2af/0x760 [ 166.910072] ? lock_acquire+0x1e4/0x540 [ 166.914045] getname_flags+0xd0/0x5a0 [ 166.917838] user_path_at_empty+0x2d/0x50 [ 166.921981] do_mount+0x180/0x1fb0 [ 166.925515] ? check_same_owner+0x340/0x340 [ 166.929828] ? lock_release+0xa30/0xa30 [ 166.933797] ? copy_mount_string+0x40/0x40 [ 166.938029] ? retint_kernel+0x10/0x10 [ 166.941914] ? copy_mount_options+0x213/0x380 [ 166.946403] ? copy_mount_options+0x1a1/0x380 [ 166.950895] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 166.955729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.961606] ? copy_mount_options+0x285/0x380 [ 166.966095] ksys_mount+0x12d/0x140 [ 166.969713] __x64_sys_mount+0xbe/0x150 [ 166.973681] do_syscall_64+0x1b9/0x820 [ 166.977557] ? finish_task_switch+0x1d3/0x870 [ 166.982043] ? syscall_return_slowpath+0x5e0/0x5e0 [ 166.986962] ? syscall_return_slowpath+0x31d/0x5e0 [ 166.991905] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 166.996928] ? prepare_exit_to_usermode+0x291/0x3b0 [ 167.001937] ? perf_trace_sys_enter+0xb10/0xb10 [ 167.006596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 167.011450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.016646] RIP: 0033:0x455ab9 [ 167.019819] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.039110] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 167.046815] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 167.054091] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 167.061354] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 167.068616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 167.075895] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000003 15:47:48 executing program 4 (fault-call:11 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 167.092691] Dev loop3: unable to read RDB block 1 [ 167.097688] loop3: unable to read partition table [ 167.104481] Dev loop0: unable to read RDB block 1 [ 167.109449] loop0: unable to read partition table [ 167.109936] loop3: partition table beyond EOD, truncated [ 167.119576] loop0: partition table beyond EOD, truncated [ 167.119935] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 167.125461] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) 15:47:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x181100, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = socket$inet(0x2, 0x3, 0x9) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0x5}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e23, 0x3ff, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x101}}}, 0x84) [ 167.221431] Dev loop3: unable to read RDB block 1 [ 167.226432] loop3: unable to read partition table [ 167.241158] loop3: partition table beyond EOD, truncated [ 167.242926] FAULT_INJECTION: forcing a failure. [ 167.242926] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 167.246797] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 167.258483] CPU: 1 PID: 11952 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 167.258491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.258494] Call Trace: [ 167.258517] dump_stack+0x1c9/0x2b4 [ 167.258537] ? dump_stack_print_info.cold.2+0x52/0x52 [ 167.294896] should_fail.cold.4+0xa/0x11 [ 167.298960] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 167.304055] ? zap_class+0x740/0x740 [ 167.307757] ? __perf_event_task_sched_out+0x2f0/0x1a60 [ 167.313106] ? trace_hardirqs_on+0x10/0x10 [ 167.317333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 167.322333] ? perf_trace_lock+0xde/0x920 [ 167.326467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.331988] ? should_fail+0x246/0xd86 [ 167.335862] ? zap_class+0x740/0x740 [ 167.339574] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 167.344664] __alloc_pages_nodemask+0x36e/0xdb0 [ 167.349319] ? kasan_check_read+0x11/0x20 [ 167.353453] ? rcu_is_watching+0x8c/0x150 [ 167.357586] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 167.362586] ? is_bpf_text_address+0xd7/0x170 [ 167.367066] ? kernel_text_address+0x79/0xf0 [ 167.371461] ? lock_acquire+0x1e4/0x540 [ 167.375416] ? fs_reclaim_acquire+0x20/0x20 [ 167.379733] ? lock_downgrade+0x8f0/0x8f0 [ 167.383869] ? lock_release+0xa30/0xa30 [ 167.387827] ? check_same_owner+0x340/0x340 [ 167.392130] ? save_stack+0xa9/0xd0 [ 167.395742] cache_grow_begin+0x91/0x710 [ 167.399791] kmem_cache_alloc+0x689/0x760 [ 167.403923] ? __sched_text_start+0x8/0x8 [ 167.408069] getname_flags+0xd0/0x5a0 [ 167.411859] ? lock_acquire+0x1e4/0x540 [ 167.415820] user_path_at_empty+0x2d/0x50 [ 167.419955] do_mount+0x180/0x1fb0 [ 167.423478] ? kasan_check_read+0x11/0x20 [ 167.427611] ? do_raw_spin_unlock+0xa7/0x2f0 [ 167.432010] ? copy_mount_string+0x40/0x40 [ 167.436236] ? kasan_kmalloc+0xc4/0xe0 [ 167.440108] ? kmem_cache_alloc_trace+0x318/0x780 [ 167.444942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.450462] ? copy_mount_options+0x285/0x380 [ 167.454953] ksys_mount+0x12d/0x140 [ 167.458564] __x64_sys_mount+0xbe/0x150 [ 167.462528] do_syscall_64+0x1b9/0x820 [ 167.466400] ? finish_task_switch+0x1d3/0x870 [ 167.470879] ? syscall_return_slowpath+0x5e0/0x5e0 [ 167.475791] ? syscall_return_slowpath+0x31d/0x5e0 [ 167.480705] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 167.485718] ? prepare_exit_to_usermode+0x291/0x3b0 [ 167.490730] ? perf_trace_sys_enter+0xb10/0xb10 [ 167.495383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 167.500213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.505396] RIP: 0033:0x455ab9 15:47:48 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) 15:47:48 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) 15:47:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0xffffffffffffffff) ioctl(r0, 0x8914, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000140)={0x0, 0x1}, 0xc) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f0000000180), 0x3) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) getgroups(0x2, &(0x7f0000000200)=[0xffffffffffffffff, 0xee00]) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000240)=[r2, r3, r4, r5, r6]) 15:47:48 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) [ 167.508564] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.527763] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 167.535457] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 167.542708] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 167.549960] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 167.557211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 167.564467] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000004 15:47:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) [ 167.619528] Dev loop5: unable to read RDB block 1 [ 167.624521] loop5: unable to read partition table [ 167.625436] Dev loop0: unable to read RDB block 1 [ 167.634397] loop0: unable to read partition table [ 167.651052] loop5: partition table beyond EOD, truncated [ 167.656626] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 15:47:48 executing program 5: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000440)={0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYRES32=r0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES32=r0, @ANYRES64=r0], @ANYRESHEX, @ANYRES32], @ANYBLOB="7af4350b411a38928d884897412edc46c06316a99ed37fbaac1d7652bea91cf5649618f5f1b3b3be07884cde86f03c1f3a027aa60cd2a4e7b40c175fe350e49da7e440ec47d64d3eab320ac573b69b0259ba6ab6", @ANYRES32, @ANYBLOB="4a7be3fd7066bc449f71fd4e199276bff44ac2338cf237e25176adebff69a1720963f76237dc6d32a7e26d7fe194056fe72e0f2851c4df66b7a6cbcbb008d81d4fcdbdc40feed1b47a98f217ae7ab7a88cccb8805e691b77e86cbc7a81ead9b6014e7e04", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYRESOCT], @ANYRES32, @ANYRESDEC=r0, @ANYRES32], 0x0, 0x1400000000000000, &(0x7f0000000480)="e9"}) 15:47:48 executing program 4 (fault-call:11 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 167.701425] Dev loop3: unable to read RDB block 1 [ 167.705607] loop0: partition table beyond EOD, truncated [ 167.706393] loop3: unable to read partition table [ 167.711891] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 167.760343] loop3: partition table beyond EOD, truncated [ 167.765914] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 167.900396] FAULT_INJECTION: forcing a failure. [ 167.900396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.912252] CPU: 1 PID: 11991 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 167.920664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.930027] Call Trace: [ 167.932632] dump_stack+0x1c9/0x2b4 [ 167.936259] ? dump_stack_print_info.cold.2+0x52/0x52 [ 167.941449] ? trace_hardirqs_on+0x10/0x10 [ 167.945672] should_fail.cold.4+0xa/0x11 [ 167.949719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 167.954816] ? trace_hardirqs_on+0x10/0x10 [ 167.959046] ? trace_hardirqs_on+0x10/0x10 [ 167.963268] ? mnt_get_count+0x150/0x150 [ 167.967325] ? dput.part.26+0x276/0x7a0 [ 167.971307] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 167.976337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.981862] ? should_fail+0x246/0xd86 [ 167.985741] ? is_bpf_text_address+0xae/0x170 [ 167.990240] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 167.995332] __alloc_pages_nodemask+0x36e/0xdb0 [ 167.999987] ? kasan_check_read+0x11/0x20 [ 168.004128] ? rcu_is_watching+0x8c/0x150 [ 168.008261] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 168.013262] ? is_bpf_text_address+0xd7/0x170 [ 168.017744] ? kernel_text_address+0x79/0xf0 [ 168.022149] ? __kernel_text_address+0xd/0x40 [ 168.026630] ? lock_acquire+0x1e4/0x540 [ 168.030587] ? fs_reclaim_acquire+0x20/0x20 [ 168.034892] ? lock_downgrade+0x8f0/0x8f0 [ 168.039033] ? lock_release+0xa30/0xa30 [ 168.042997] ? check_same_owner+0x340/0x340 [ 168.047320] ? save_stack+0xa9/0xd0 [ 168.050931] cache_grow_begin+0x91/0x710 [ 168.054979] kmem_cache_alloc+0x689/0x760 [ 168.059115] getname_flags+0xd0/0x5a0 [ 168.062902] user_path_at_empty+0x2d/0x50 [ 168.067043] do_mount+0x180/0x1fb0 [ 168.070589] ? kasan_check_write+0x14/0x20 [ 168.074812] ? copy_mount_string+0x40/0x40 [ 168.079050] ? kasan_kmalloc+0xc4/0xe0 [ 168.082925] ? kmem_cache_alloc_trace+0x318/0x780 [ 168.087752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 168.093273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 168.098796] ? copy_mount_options+0x285/0x380 [ 168.103278] ksys_mount+0x12d/0x140 [ 168.106888] __x64_sys_mount+0xbe/0x150 [ 168.110845] do_syscall_64+0x1b9/0x820 [ 168.114715] ? finish_task_switch+0x1d3/0x870 [ 168.119194] ? syscall_return_slowpath+0x5e0/0x5e0 [ 168.124108] ? syscall_return_slowpath+0x31d/0x5e0 [ 168.129026] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 168.134037] ? prepare_exit_to_usermode+0x291/0x3b0 [ 168.139041] ? perf_trace_sys_enter+0xb10/0xb10 [ 168.143692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 168.148517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.153687] RIP: 0033:0x455ab9 [ 168.156853] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.175994] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 168.183693] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 168.190947] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 168.198202] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 168.205456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 168.212711] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000005 15:47:50 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109", 0xe7, 0x100}]) 15:47:50 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="6d617000007e36f508d267ab0c7afe9f024e551d65d1e42d5eeba686dfc9fc8c5d0183420b678fa50400"}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x8001, 0x9}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x0) 15:47:50 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) 15:47:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)='{wlan1ppp1\x00', 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r2, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:50 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x1, 0x4, 0x4000400, 0x0, 0xffffffffffffff9c}, 0x2c) 15:47:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) fchdir(r0) io_setup(0x7e1e, &(0x7f0000000000)=0x0) io_submit(r2, 0x2, &(0x7f00000002c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000200)}]) 15:47:50 executing program 4 (fault-call:11 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:50 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) 15:47:50 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x3) ioctl$int_out(r0, 0x40045730, &(0x7f0000000100)) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/186) [ 169.748081] Dev loop3: unable to read RDB block 1 [ 169.753077] loop3: unable to read partition table [ 169.766989] Dev loop0: unable to read RDB block 1 [ 169.771996] loop0: unable to read partition table [ 169.776176] FAULT_INJECTION: forcing a failure. [ 169.776176] name failslab, interval 1, probability 0, space 0, times 0 [ 169.788246] CPU: 0 PID: 12020 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 169.796662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.799466] loop0: partition table beyond EOD, [ 169.806025] Call Trace: [ 169.806049] dump_stack+0x1c9/0x2b4 [ 169.806068] ? dump_stack_print_info.cold.2+0x52/0x52 [ 169.806084] ? __kernel_text_address+0xd/0x40 [ 169.806106] ? perf_trace_lock+0xde/0x920 [ 169.810810] truncated [ 169.813373] should_fail.cold.4+0xa/0x11 [ 169.813397] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 169.817038] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 169.822197] ? save_stack+0xa9/0xd0 [ 169.822212] ? save_stack+0x43/0xd0 [ 169.822231] ? kasan_kmalloc+0xc4/0xe0 [ 169.860718] ? kmem_cache_alloc_trace+0x152/0x780 [ 169.865548] ? proc_init_fs_context+0x49/0x130 [ 169.870129] ? vfs_new_fs_context+0x2ba/0x700 [ 169.874618] ? do_mount+0x5cf/0x1fb0 [ 169.878321] ? ksys_mount+0x12d/0x140 [ 169.882116] ? do_syscall_64+0x1b9/0x820 [ 169.886170] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.891524] ? __x64_sys_mount+0xbe/0x150 [ 169.895660] ? do_syscall_64+0x1b9/0x820 [ 169.899710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.905078] ? lock_acquire+0x1e4/0x540 [ 169.909043] ? fs_reclaim_acquire+0x20/0x20 [ 169.913355] ? lock_downgrade+0x8f0/0x8f0 [ 169.917497] ? check_same_owner+0x340/0x340 [ 169.921812] ? rcu_note_context_switch+0x730/0x730 [ 169.926735] __should_failslab+0x124/0x180 [ 169.930963] should_failslab+0x9/0x14 [ 169.934751] __kmalloc_track_caller+0x2c4/0x760 [ 169.939411] ? vfs_set_fs_source+0x67/0x180 [ 169.943724] kmemdup_nul+0x31/0xa0 [ 169.947258] vfs_set_fs_source+0x67/0x180 [ 169.951395] do_mount+0x61b/0x1fb0 [ 169.954927] ? check_same_owner+0x340/0x340 [ 169.959237] ? lock_release+0xa30/0xa30 [ 169.963207] ? copy_mount_string+0x40/0x40 [ 169.967435] ? retint_kernel+0x10/0x10 [ 169.971318] ? copy_mount_options+0x1f0/0x380 [ 169.975804] ? copy_mount_options+0x1fa/0x380 [ 169.980292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 169.985818] ? copy_mount_options+0x285/0x380 [ 169.990325] ksys_mount+0x12d/0x140 [ 169.993943] __x64_sys_mount+0xbe/0x150 [ 169.997910] do_syscall_64+0x1b9/0x820 [ 170.001786] ? finish_task_switch+0x1d3/0x870 [ 170.006272] ? syscall_return_slowpath+0x5e0/0x5e0 [ 170.011251] ? syscall_return_slowpath+0x31d/0x5e0 [ 170.016177] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 170.021183] ? prepare_exit_to_usermode+0x291/0x3b0 [ 170.026188] ? perf_trace_sys_enter+0xb10/0xb10 [ 170.030846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 170.035686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.040861] RIP: 0033:0x455ab9 [ 170.044033] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.063319] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 170.071021] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 170.078291] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 170.085636] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 15:47:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="05000000000000000d000030050000000500000000000000000000400000000001000000000f00d66c3f49cd4c6c71ff00040000000000000a00000006d1"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x38f}]}) 15:47:51 executing program 2: r0 = socket$inet6(0xa, 0x8000000000801, 0x7fff) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200003fff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x10a, 0x0, 0x2ff]}) [ 170.092895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 170.100160] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000006 [ 170.109756] loop3: partition table beyond EOD, truncated [ 170.115317] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:51 executing program 6: r0 = mq_open(&(0x7f0000000100)='\x00', 0x42, 0x71, &(0x7f0000000140)={0x6, 0x7, 0x7563a819, 0x7fffffff, 0x6, 0x6, 0x4, 0x8}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xa, 0x3, 0x18, "c293e4ae5e01ff8ba11adc59cfd54f813828ac444482bcdc944513d8941e7e1e337cd1e4dbf09724eb1214d10faad877fcc6ee9577e3a2da968b660f9d74aabe", "c1d9bf6fc6383bebf286845d4831d406773cabf520017e740f6350efa0bba550f26a5fb9a04e2a2d3074dec823327796a736fa3138af5699d234a67a872291d3", "d2f8dae883d5fb31e858400b69ad887b70df9f6a7e7b2005a0bac92eb0fa48c9", [0x1f, 0x4]}) signalfd(r0, &(0x7f0000000180)={0x8001}, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398417f1b}) 15:47:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) 15:47:51 executing program 4 (fault-call:11 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000700)={0x0, 0xfffffffffffffffb}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000780)={0x0, 0xfffffffffffff800}, &(0x7f00000007c0)=0x8) sendmsg$inet_sctp(r2, &(0x7f00000008c0)={&(0x7f0000000400)=@in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xb}, 0x7}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000440)="328bb7b1d51e78c11ce6e311f342f4dbbe92891816e1cbd80b8cc611183453f39d42bc7324437e31a7a4d7ab26300ebb4842b09729ce95aa31048bc6e9aeef47ba49b9b6140486374e57386a058d99c5869b4f942068be9b0a3414e4930d3aa6ac204494a046f2ea4fc43f3ca8139222ff4a2a7517018ffd677768b89da89e4c91485cf7dfa5e1010ee1ac6a98e1cf5d60a9ab", 0x93}, {&(0x7f0000000500)="d117ce7275cca360ecfde6a9ec2456281cca710c976fdd6597e90855e8dfa813b8dd62e984d2ead109092122cb1ad186a274304547278f36b3b7721345a679556630d37aa60a673d334d3af962edda699c01c7414d75d069ee36bd2c2f709c16bad92f9e9a585dcdce8267eb306c75b58ba46e21b0c6626ee65e5e4e2bff08accda9fe5f30e141be21f4212cd6d40c5b353c4ab70c", 0x95}, {&(0x7f00000005c0)="b070bcfe2c431c4e3303d14304635042c5415037122ffe948398ff87762679af25b8e583f11f9fa04070fe070aa335f39aef2175348da39ef56833c96fbacc9ea93abc40758043c4e97e237e9842e834fc2474f0e11c8788f3b87891ee11cbc4090d2f84770d9091fa843327ca15390a1f4d7df6ef2e355911005e47cc5ddd1182a792cc75ca2a05072e512a6942e7931f9de323865b64fc9b19873b040854a71436359f129558549e0bf87819a839ee2d7b872d107ba7c7e65f1e209e56cffce9d187a563051b527115dd1df1b4bf70a3f19577", 0xd4}], 0x3, &(0x7f0000000800)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x1ff, 0x3, 0x0, 0x8, 0x6af, 0x35, 0x0, r3}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xfff}}, @sndrcv={0x30, 0x84, 0x1, {0x6, 0x2, 0x2, 0x7, 0x400, 0x6, 0x5, 0x0, r4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x376f}}, @authinfo={0x18, 0x84, 0x6, {0x100000001}}], 0xa8, 0x4000}, 0x24044055) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x1087}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r5, 0x100000000, 0x30}, &(0x7f00000003c0)=0xc) vmsplice(r1, &(0x7f0000000bc0)=[{&(0x7f0000000900)}, {&(0x7f0000000940)="cb4bfa19a1efa87e8fa7b1bfe36db1d17bfe2b17eeb36cc0f24fb283c6e86e8d38fa800d065ac512d1d0fdd9e7d6bbf43c98fe2d91966afa2fe8e7b83092885b436e3b87e9b4619225078cfaeb6039009af34fc986a93c0d709980ce366900", 0x5f}, {&(0x7f00000009c0)="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", 0xff}, {&(0x7f0000000ac0)="7a8bcd8efee322a6ce20e0cbc154120af62eddccda3aa56c0d27e45e6f5cc67022e77930da4fae6a06f95ea3ae6c86adb8b719e3459cc30ecbfd2e368b407a7b31e3ef708a278e380111e350069a9f613f989bfa3c3a889bf0265600ffab4885a1ce00eea61a3532ee5ade32e51a6262ddf5c247fe025993076591c79b79657c1b2bea6feb93a448131315db0507c03f3b28b2bd9c4a6d06b8708cefdbe392be48af76b3d9de2caaf999360537f05e79ff35ef40", 0xb4}, {&(0x7f0000000b80)="52e8da3580f5b49986affb399b22d1e6428693d8d532b3a6904d9822537fd833a3c25669052c981e960878af27", 0x2d}], 0x5, 0xf) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40201, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x8001, 0xbeb}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000000240)={r7, 0x23, "42374c397e057b1df206ce5da11ed0d42a652b95f0728d39cc845503e863f1c69d45d3"}, &(0x7f0000000280)=0x2b) 15:47:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000000000020022030c0013ca695600cc73aed30300080000000000000000", @ANYRES32=0x0], 0x20}, 0x1}, 0x0) socketpair(0x7, 0x2, 0x1f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_team\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000140)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1a}}, r2}, 0x14) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x7fff, 0x0, 0x0, 0x9}) 15:47:51 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) 15:47:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x31) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = memfd_create(&(0x7f0000000040)='-\x00', 0x3) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x2208915, &(0x7f0000000140)="025cc83db5ed05daec2885ab8f7959e55b726d345f8f762070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x0, 0x33}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) write$binfmt_misc(r0, &(0x7f0000000a80)={'syz1', "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"}, 0x5a4) [ 170.309876] Dev loop0: unable to read RDB block 1 [ 170.314879] loop0: unable to read partition table [ 170.321207] Dev loop3: unable to read RDB block 1 [ 170.326179] loop3: unable to read partition table [ 170.335213] loop3: partition table beyond EOD, truncated [ 170.340882] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 170.348537] loop0: partition table beyond EOD, truncated [ 170.350799] FAULT_INJECTION: forcing a failure. [ 170.350799] name failslab, interval 1, probability 0, space 0, times 0 [ 170.354086] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 170.365277] CPU: 1 PID: 12070 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 170.380924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.390264] Call Trace: [ 170.392840] dump_stack+0x1c9/0x2b4 [ 170.396465] ? dump_stack_print_info.cold.2+0x52/0x52 [ 170.401645] should_fail.cold.4+0xa/0x11 [ 170.405697] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 170.410790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 170.415797] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 170.420541] ? trace_hardirqs_on+0x10/0x10 [ 170.424762] ? lock_acquire+0x1e4/0x540 [ 170.428724] ? is_bpf_text_address+0xae/0x170 [ 170.433210] ? lock_downgrade+0x8f0/0x8f0 [ 170.437347] ? lock_release+0xa30/0xa30 [ 170.441311] ? lock_acquire+0x1e4/0x540 [ 170.445271] ? fs_reclaim_acquire+0x20/0x20 [ 170.449584] ? lock_downgrade+0x8f0/0x8f0 [ 170.453723] ? check_same_owner+0x340/0x340 [ 170.458031] ? rcu_note_context_switch+0x730/0x730 [ 170.462946] ? unwind_get_return_address+0x61/0xa0 [ 170.467867] __should_failslab+0x124/0x180 [ 170.472092] should_failslab+0x9/0x14 [ 170.475880] kmem_cache_alloc_trace+0x2cb/0x780 [ 170.480541] ? save_stack+0xa9/0xd0 [ 170.484175] alloc_super+0xd4/0xb10 [ 170.487790] ? ksys_mount+0x12d/0x140 [ 170.491591] ? destroy_unused_super.part.11+0x110/0x110 [ 170.496941] ? sget_fc+0x261/0x950 [ 170.500472] ? lock_downgrade+0x8f0/0x8f0 [ 170.504613] ? kasan_check_read+0x11/0x20 [ 170.508747] ? do_raw_spin_unlock+0xa7/0x2f0 [ 170.513138] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 170.517708] ? kasan_check_write+0x14/0x20 [ 170.521932] ? do_raw_spin_lock+0xc1/0x200 [ 170.526158] ? ns_test_super+0x50/0x50 [ 170.530042] sget_fc+0x269/0x950 [ 170.533403] ? compare_single+0x10/0x10 [ 170.537370] ? alloc_super+0xb10/0xb10 [ 170.541248] ? kasan_kmalloc+0xc4/0xe0 [ 170.545127] ? __kmalloc_track_caller+0x311/0x760 [ 170.549959] ? proc_root_lookup+0x60/0x60 [ 170.554094] vfs_get_super+0x6e/0x270 [ 170.557883] proc_get_tree+0x88/0xb0 [ 170.561594] vfs_get_tree+0x1cb/0x5c0 [ 170.565385] do_mount+0x6c1/0x1fb0 [ 170.568912] ? check_same_owner+0x340/0x340 [ 170.573220] ? lock_release+0xa30/0xa30 [ 170.577187] ? copy_mount_string+0x40/0x40 [ 170.581408] ? kasan_kmalloc+0xc4/0xe0 [ 170.585285] ? kmem_cache_alloc_trace+0x318/0x780 [ 170.590120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 170.595648] ? _copy_from_user+0xdf/0x150 [ 170.599901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 170.605426] ? copy_mount_options+0x285/0x380 [ 170.609911] ksys_mount+0x12d/0x140 [ 170.613544] __x64_sys_mount+0xbe/0x150 [ 170.617516] do_syscall_64+0x1b9/0x820 [ 170.621388] ? finish_task_switch+0x1d3/0x870 [ 170.625869] ? syscall_return_slowpath+0x5e0/0x5e0 [ 170.630785] ? syscall_return_slowpath+0x31d/0x5e0 [ 170.635703] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 170.640707] ? prepare_exit_to_usermode+0x291/0x3b0 [ 170.645709] ? perf_trace_sys_enter+0xb10/0xb10 [ 170.650365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 170.655198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.660375] RIP: 0033:0x455ab9 [ 170.663547] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.683531] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 170.691235] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 170.698492] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 15:47:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40002, 0x0) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10, 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x200, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioperm(0x0, 0x9, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="c482dd47d2410f01b8a6000000b9800000c00f3235010000000f300f21c3c46339793200c44238f5fd66baa00066b859cc66eff3af66b8fe008ed0b9800000c00f3235002000000f30", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 15:47:51 executing program 5: r0 = socket$inet(0x10, 0x800000000003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000040)="2f0000005200030007fffd946fa283bc8020000000040005031d85680800a3a2d188737e0b000f0000001389598e2c", 0x2f}], 0x1, 0x0, 0x4a}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000000280, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14, 0x80800) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={@empty, 0x7e, r2}) sendmsg$kcm(r1, &(0x7f0000001940)={&(0x7f0000000140)=@l2={0x1f, 0xdb69, {0x79, 0x8, 0x3, 0x1000, 0x3, 0x81}, 0x9, 0x1000}, 0x80, &(0x7f0000001540)=[{&(0x7f00000001c0)="3ea7c829959bc7eb2e4f10ba626f751baf0e361659b82800d07f639ac88e55738f1ff490b6c027ab545433f3a12aa8264fec3dfbac391f9590069947b76f5e951cd277ef91a8c4a80d2f720b18a06471774fd362d7d4896cc0860a9fd86a39854f4af18a0354bb1f1a5cc401b34071607d90bba0238c6bcf298138fdf5753b9880f80d687d20f1c0041a164fe33cb3784c53dbd373b7534b49c61f74774e940f6f92a64628a31178992fe8a128b21de00c1b0da647a5293397ef20d4898fe6e796b95b66b8fa9df0907778dd686e779783b9", 0xd2}, {&(0x7f00000002c0)="d5e3f7922892e0eadbe6a7b8ab7c7c803713e785eb2d1c66ee231fee36e56ed356753fb45e4a22ba2fa28e6f991fcff7be200323db8e92e50ad916c934301506e6c9eaba57d5bb787b4a600263e42f8b02a0763ac0de7894ffcc12a909bf77b94f6c0c2a404cadb5b62d7582ad239a2154f9379f75351e7cb1b7ea28481a990eea773f1108ad6a285c415c1fdb42a68238b665b3e4094408f3f56a8852b91aa08015f3af7e6efa5d3b6d9c7ea8837bf8c8307021fd115261e60a3d931b3a7d7412ed9c93aac89b7585786d43e89880118960bc2d37724ccb04e0", 0xda}, {&(0x7f00000003c0)="6be1a00a4f94ff67b44e04a2224b10749a32988d3f72e6f65e7d84b2bf3d723610bf4a34802ac00cd3d49541da45b771b7ec75d652c31eb10c37bfb39beee5d4a3ad05af94629383f7cd6184c29ba348c4fadb9d4f9e0dc533bfca4ea9b4016b5dcd30e7272fcee6964810d24d790b0bdca74d5232ad4173c1", 0x79}, {&(0x7f0000000440)="d4636fe7eead2fa1aa8071dd299f7e40cffb6da38dfd652d7f3c89496c74437a00c521b88d53622b3ce1e9fed3e7ad44af91d18a28d011432eaab1636e601868cd98d15d0b2d1159ff3b61b7353248a30d964968f9a7474ad160a7c14804b2619b", 0x61}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="89887c6109e7b17cbc71233a9bf73c6fa690e63ae2a1703726ebeb2d1cf2b15ce435a4ec5a17d2ffc3b79bdb3b003720b43c936a3a60fc92469f277ebcbcce28517113428a56163f0e4b8319aee000dbddbe8ba2edaf4feef2f102ba2c2f3883445f9e", 0x63}], 0x6, &(0x7f00000015c0)=ANY=[@ANYBLOB="10010000000000000701000009000000fb2ea05d41b02b205807c1d1da17c2f94f9d5fc5ee1f9666040c38c01b09f5c847fbe9c54a3c703b99ebaf8bcc424c0ecda5c15c0645d7fc63199c6e78b82faf2af979bc0b6d5ccb904e129770f81383cc4aabb2f17bb913c1270949ce9fa6820e324e8ff8acd171963925f293fb30ab92579fd4b37ab112179b282b64dbd85ec4310d05e4c143affdb5204949f468fb80954404d08beee965be970a4edd75f833389a4077cb3b8b27ee55570b1f0536139df05aa7a4999873b3b0e4852e83a70764606135bcc4763699bff392fe88654dc2389782acf9407d905ab83ae5f3e9f8ae55cb5723a06ffedd952fd6d47b893588ed40d51f7a5513d21cdba0bd000088000002000000001f010000080000002139281e1572dbf99967b58530260390380322a936711379e6019270eb09ec114f3212a83f74f022fc64098a1c7ff7dc885c51d3f2ef75f4d3b6772fad3c6066eacd460b452ef73e4b722a6f701d0e8cdddcc513219c6dc70f68e98b8b96304827afe28f3d60882abfe910e4ad6764102a7b0000000000006800000000000000050100000300000052b1952f4356bd4fdf5587b431908206d265b77dd4ee537cdb1450ef93b9a55b16afc2ea06a3f499b32110126237235d3fa6c1e5b61a7f9a9335ccb777b7c003b9494b7a6475e7e012338a65547d22230bc86df94d00000058000000000000001f0100009b0b00007c72750f5eb209a05de121173126124422191bc3d0e24557a041ff0038cd5219960bbfac7d727642032ef92574a3aa42ed65b17fad3bf52bae55adaee2bf5e605494bd78fb698f2548000000000000001701000003000000e1619f72ea57fa8cd6ac26150ba1b172e1fbc7ccd14f5949fb425587e9c975aca270a7696bcb313041f8254efd2b6273e68b8d0000000000c000000000000000994ca9de5d750000c59afa83fb933833a65d3948a22b0a48498199fa6eee200ee87206e848591292228d5b1355e5fc2775e8711fc687c6416a4dcd678220f9918aac2503cb01b108be34a8b996659955e0e6c611f133097f3129c9d89ee274b0553dd3ab111f386e26982c20d92b11b6eeb6565e50b1ea8c2e99ce06965622e65a2b517bb50db5872aee94c74c367822502c4958bf0a766a757bdeca53f2e3856651f921fa6b21e13a36ec799dedecb7722c100000000000"], 0x360, 0x8000}, 0x0) [ 170.705746] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 170.713001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 170.720268] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000007 15:47:51 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) 15:47:51 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xd, &(0x7f0000000180), 0x10) 15:47:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) [ 170.824976] Dev loop3: unable to read RDB block 1 [ 170.829959] loop3: unable to read partition table 15:47:52 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) 15:47:52 executing program 5: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) socketpair(0x17, 0x800, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r0, 0x0) [ 170.865529] Dev loop0: unable to read RDB block 1 [ 170.870539] loop0: unable to read partition table [ 170.883169] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure [ 170.888830] kvm: pic: non byte write [ 170.893900] loop0: partition table beyond EOD, truncated [ 170.899786] loop3: partition table beyond EOD, [ 170.902704] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 15:47:52 executing program 4 (fault-call:11 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:52 executing program 6: r0 = socket(0x1, 0x6, 0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x44c876bc, 0x1, 0x7fffffff, 0x1}, {0x0, 0x6, 0x80000001, 0x100}, {0x401, 0x7ff, 0x7, 0xe000000000000000}, {0x1, 0x1, 0x9, 0x5}, {0xdc, 0x1000, 0x4, 0x6}]}, 0x10) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0xf4, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x407f99a0ba45d92f, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000140)={0x40, 0xd0f, 0x1, 0x9, 0x4, 0xd3e}) 15:47:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000840)={0x0, 0x0}) utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000880)={{r0, r1/1000+30000}, {0x0, 0x7530}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000900)='/dev/kvm\x00', 0x200020020203, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcs\x00', 0x200, 0x0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f00000007c0)) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f00000000c0)={0x3, 0x0, 0xe3, {0x0, 0x989680}, 0x8001, 0x2}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3f, 0x6, &(0x7f0000000680)=[{&(0x7f0000000240)="2a0a389522368be6fff2dbc134a16b7a756ba45008b65d67362533ca44b88d2b7dfac10f07377be4c5059855256339e7712dc0826fd3eeebe010af10617bd953b33f99882d8cedf8487df5fc890c7bef681a39df68e66a96d0af0f23016817838776811846c1a1543ad368feb64eaa1b03d66b116e53b49aa15827fb75dafb45e34d28565bf15012cf39e01b84f780a94b6c82e2e434d31f75db05605ab0670fd48437f8c886c40758eaefe75d72f263a8d6a0fc3f9d7273ff9c342a913ed4dcd1b702201a7be2bbe79122cd6fe4820a591a907636e97ad264a2d248d63d442c7625dfb7", 0xe4, 0xf69}, {&(0x7f0000000340)="6abd6a19f2b20c256a814fe0b67c3aef181c7211cc58970f0b0bb558e8eb0a97a2f160a6e2b4494f31487463649b2724cd076f272d8f0088fc219dd1daae5511468b0f9fa1902fe7033c39d80f8e84023014221699ceaa53315d48a681d2f8daabb4a361a9a0818b2f9b64ce2aaeb3a2efc08c2b2904dc961cf6d64a2a4106f0d8a1aa16af822a2a12a7efda34a8965148e6568b725b37c454b346eadec9c975c8a260188017b03923352d329bbd10473f7faca400894875fb6e99da58208c452053a378cc4b0bde62ca0f182a2a0f0f", 0xd0, 0x8e2}, {&(0x7f0000000440)="4e57915a7cda07f2aebbfd61fcb9508119ac460a21025f247237ac036aabb6df2f6beb52cd82725f1513b8ab7390dc5480bafc290cced74f42f10edb481b1252029fe5e82f2c62cab4f0d9fd00a91d18e56f8d2fc14bcc71d1d6fbe0086feb368bd04ec0effb7cbe77320c8baf5e1fba1461d298a518944b957d4274cb2538375b36886a268b0ca40fc02cb9", 0x8c, 0x1}, {&(0x7f0000000500)="3d6b1f8676bfd5bfdb", 0x9}, {&(0x7f0000000540)="905e501f1d652b307b31ba39fd521b0a146ff9931c559c6c25b6baa50ed7ac882f590bd039b913170ee12f25af34c4f6fa3f44a3c97ce1f9a0ada49e316cb2", 0x3f, 0x1aa}, {&(0x7f0000000580)="84686fb20ccc1da8fd5988a3c8a8c92591130cac339c9d7717e079b92a336518274bac21662ea67e8cd056d64cd5fce354bced096350528c628f18830870dfb98ee79f7fd6540a714bac7ee98234994bb074f954e4ac6ba9e3867fc13af819910b1be58e86519fd310796e003e9c6bf2f9177b8bd90077915b9fa5ced6cbec667116f2e9bd9b2ea397972d40a9349d12c492d22b3326f0d67e1c768251b6ae6ff481f190b9873bed05a516a42917218d8550eecfb5a9ddf22975b728671f7ca28f401a0855e792f2dab7831d268d8c59c07cb9b75b9a24f5b86a813f1f2bf53efc559dbde2", 0xe5, 0x9}], 0x890001, &(0x7f0000000740)={[{@type={'type', 0x3d, "586cdd8a"}, 0x2c}, {@type={'type', 0x3d, "963adcd1"}, 0x2c}, {@session={'session', 0x3d, 0x3}, 0x2c}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 170.914715] truncated [ 170.914870] kvm: pic: non byte write [ 170.917173] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) 15:47:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x4100c0, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)="41323272a0a07e45d4f4e5b5594128894fc5049dc51f18be4d4bd46d0d1c2e3dcfc6dd8d8bc1ee22357f98139f6c48fa4e320b5484d1755e5d5af7410ae73a1250e77d756c41f3e7fa0df5c0d72c1b41102fbbce12483bd9bf67e04404a548edd16bb47c5b9056fcd9bb09fc2a5036c9836ff6e60c5240fb810c7229bd068f18a67c15b95e95c49034be759daa3af330917d0664dacfefef979eced95cb77c6f2b7d21cb18") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x105400, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000003c0)=0x9) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000380)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x1}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x2}, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x6}}, 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x5}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={r3, 0x2}, 0x8) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x7, 0x40, 0x60}) 15:47:52 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3", 0xeb, 0x100}]) [ 170.965199] kvm: pic: non byte write [ 170.983314] kvm: pic: non byte write [ 171.000067] kvm: pic: non byte write [ 171.042227] kvm: pic: non byte write [ 171.047565] Dev loop0: unable to read RDB block 1 [ 171.052547] loop0: unable to read partition table [ 171.054982] FAULT_INJECTION: forcing a failure. [ 171.054982] name failslab, interval 1, probability 0, space 0, times 0 [ 171.068805] CPU: 1 PID: 12116 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 171.077219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.086580] Call Trace: [ 171.089181] dump_stack+0x1c9/0x2b4 [ 171.092647] loop0: partition table beyond EOD, truncated [ 171.092816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 171.092836] ? perf_trace_lock+0xde/0x920 [ 171.098346] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 171.103470] should_fail.cold.4+0xa/0x11 [ 171.103488] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 171.103510] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 171.129074] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 171.133848] ? lock_acquire+0x1e4/0x540 [ 171.137836] ? is_bpf_text_address+0xae/0x170 [ 171.142346] ? lock_downgrade+0x8f0/0x8f0 [ 171.146491] ? lock_release+0xa30/0xa30 [ 171.150459] ? lock_acquire+0x1e4/0x540 [ 171.154424] ? fs_reclaim_acquire+0x20/0x20 [ 171.158735] ? lock_downgrade+0x8f0/0x8f0 [ 171.162878] ? check_same_owner+0x340/0x340 [ 171.167196] ? rcu_note_context_switch+0x730/0x730 [ 171.172113] ? unwind_get_return_address+0x61/0xa0 [ 171.177038] __should_failslab+0x124/0x180 [ 171.181269] should_failslab+0x9/0x14 [ 171.185066] kmem_cache_alloc_trace+0x2cb/0x780 [ 171.189726] ? save_stack+0xa9/0xd0 [ 171.193346] alloc_super+0xd4/0xb10 [ 171.196984] ? destroy_unused_super.part.11+0x110/0x110 [ 171.202340] ? sget_fc+0x261/0x950 [ 171.205869] ? lock_downgrade+0x8f0/0x8f0 [ 171.210012] ? kasan_check_read+0x11/0x20 [ 171.214154] ? do_raw_spin_unlock+0xa7/0x2f0 [ 171.218554] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 171.223127] ? kasan_check_write+0x14/0x20 [ 171.227352] ? do_raw_spin_lock+0xc1/0x200 [ 171.231581] ? ns_test_super+0x50/0x50 [ 171.235458] sget_fc+0x269/0x950 [ 171.238819] ? compare_single+0x10/0x10 [ 171.242790] ? alloc_super+0xb10/0xb10 [ 171.246672] ? kasan_kmalloc+0xc4/0xe0 [ 171.250558] ? __kmalloc_track_caller+0x311/0x760 [ 171.255393] ? proc_root_lookup+0x60/0x60 [ 171.259540] vfs_get_super+0x6e/0x270 [ 171.263338] proc_get_tree+0x88/0xb0 [ 171.267050] vfs_get_tree+0x1cb/0x5c0 [ 171.270845] do_mount+0x6c1/0x1fb0 [ 171.274395] ? check_same_owner+0x340/0x340 [ 171.278706] ? lock_release+0xa30/0xa30 [ 171.282675] ? copy_mount_string+0x40/0x40 [ 171.286904] ? kasan_kmalloc+0xc4/0xe0 [ 171.290786] ? kmem_cache_alloc_trace+0x318/0x780 [ 171.295626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.301151] ? _copy_from_user+0xdf/0x150 [ 171.305289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 171.310816] ? copy_mount_options+0x285/0x380 [ 171.315305] ksys_mount+0x12d/0x140 [ 171.318925] __x64_sys_mount+0xbe/0x150 [ 171.322891] do_syscall_64+0x1b9/0x820 [ 171.326771] ? syscall_slow_exit_work+0x500/0x500 [ 171.331603] ? syscall_return_slowpath+0x5e0/0x5e0 [ 171.336526] ? syscall_return_slowpath+0x31d/0x5e0 [ 171.341447] ? prepare_exit_to_usermode+0x291/0x3b0 [ 171.346456] ? perf_trace_sys_enter+0xb10/0xb10 [ 171.351115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 171.355955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.361135] RIP: 0033:0x455ab9 [ 171.364309] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.383595] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:47:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) select(0x40, &(0x7f0000000040)={0x80, 0xffffffff00000000, 0x6, 0x2, 0x7, 0xc39, 0x0, 0x7f}, &(0x7f0000000080)={0x4, 0x997, 0x3f, 0x100000001, 0x5, 0x0, 0x9}, &(0x7f00000000c0)={0x80000000, 0x3, 0x5, 0x401, 0xfa, 0xef8e, 0x5, 0x2}, &(0x7f00000001c0)) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000440)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000180)}}, {{0x0, 0x0, &(0x7f0000002bc0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3200dfffffff00002900000003000000"], 0x10}}], 0x2, 0x0) 15:47:52 executing program 6: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u', 0x2c}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x400, 0x440000) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)={0x40, 0x3, 0x0, {0x0, 0x1f, 0x0, 'cgroupselinux[nodevvmnet1+#[-+/'}}, 0x40) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffff, 0x40000) setsockopt$inet6_buf(r3, 0x29, 0x6, &(0x7f0000000140)="2b28705a4f191a9d9b555073169ea4e20b9b0626c9aa04c2b2c9ce6ab1cb5cc29506b01a12ce9d41150858b0087ac82f6e947754ba3d7380c2ae2b7d8b4091d92e1a80eee232fa86660ba575b9bba339ba74fb86d49f8f", 0x57) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any', 0x2c}]}}) chmod(&(0x7f00000004c0)='./file0\x00', 0x0) [ 171.391297] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 171.398552] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 171.405820] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 171.413079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 171.420336] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000008 [ 171.427899] kvm: pic: non byte write [ 171.432810] kvm: pic: non byte write 15:47:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 171.446631] Dev loop3: unable to read RDB block 1 [ 171.449256] kvm: pic: non byte write [ 171.451616] loop3: unable to read partition table [ 171.463701] kvm: pic: non byte write [ 171.472313] loop3: partition table beyond EOD, truncated [ 171.477914] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) 15:47:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) 15:47:52 executing program 4 (fault-call:11 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:52 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)="8e", 0xffffffffffffff9c}, 0x10) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0xffffffffffff7fe5, @mcast1={0xff, 0x1, [], 0x1}, 0x7ca2}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e20, @rand_addr=0x800}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0xc000000000000000, @local={0xfe, 0x80, [], 0xaa}, 0x7}, @in6={0xa, 0x4e23, 0x9, @empty, 0x1000}, @in6={0xa, 0x4e22, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0x7fff, @mcast2={0xff, 0x2, [], 0x1}, 0x6b885f7e}], 0xdc) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000300)={0x8001, 0x0, {0x3, 0x0, 0x10001, 0x0, 0x6}}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x7c, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x2, 'wrr\x00', 0x2, 0x2cf, 0x13}, 0x2c) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0xf503}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xffffffffffffffd6, 0x23, 0x1, 0x70bd28, 0xfffffffffffffffc, {0x12}}, 0x14}, 0x1}, 0x0) 15:47:52 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) [ 171.613775] Dev loop3: unable to read RDB block 1 [ 171.618801] loop3: unable to read partition table [ 171.663009] loop3: partition table beyond EOD, truncated [ 171.663803] FAULT_INJECTION: forcing a failure. [ 171.663803] name failslab, interval 1, probability 0, space 0, times 0 [ 171.668668] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 171.687227] CPU: 0 PID: 12166 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 171.695631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.704975] Call Trace: [ 171.707559] dump_stack+0x1c9/0x2b4 [ 171.711182] ? dump_stack_print_info.cold.2+0x52/0x52 [ 171.716366] should_fail.cold.4+0xa/0x11 [ 171.720449] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 171.725566] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 171.730578] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 171.735326] ? trace_hardirqs_on+0x10/0x10 [ 171.739545] ? lock_acquire+0x1e4/0x540 [ 171.743503] ? is_bpf_text_address+0xae/0x170 [ 171.748701] ? lock_downgrade+0x8f0/0x8f0 [ 171.752854] ? lock_release+0xa30/0xa30 [ 171.756830] ? lock_acquire+0x1e4/0x540 [ 171.760794] ? fs_reclaim_acquire+0x20/0x20 [ 171.765116] ? lock_downgrade+0x8f0/0x8f0 [ 171.769252] ? check_same_owner+0x340/0x340 [ 171.773563] ? rcu_note_context_switch+0x730/0x730 [ 171.778477] ? unwind_get_return_address+0x61/0xa0 [ 171.783395] __should_failslab+0x124/0x180 [ 171.787618] should_failslab+0x9/0x14 [ 171.791412] kmem_cache_alloc_trace+0x2cb/0x780 [ 171.796069] ? save_stack+0xa9/0xd0 [ 171.799686] alloc_super+0xd4/0xb10 [ 171.803293] ? ksys_mount+0x12d/0x140 [ 171.807082] ? destroy_unused_super.part.11+0x110/0x110 [ 171.812435] ? sget_fc+0x261/0x950 [ 171.815977] ? lock_downgrade+0x8f0/0x8f0 [ 171.820126] ? kasan_check_read+0x11/0x20 [ 171.824265] ? do_raw_spin_unlock+0xa7/0x2f0 [ 171.828657] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 171.833227] ? kasan_check_write+0x14/0x20 [ 171.837454] ? do_raw_spin_lock+0xc1/0x200 [ 171.841685] ? ns_test_super+0x50/0x50 [ 171.845558] sget_fc+0x269/0x950 [ 171.848909] ? compare_single+0x10/0x10 [ 171.852871] ? alloc_super+0xb10/0xb10 [ 171.856742] ? kasan_kmalloc+0xc4/0xe0 [ 171.860613] ? __kmalloc_track_caller+0x311/0x760 [ 171.865440] ? proc_root_lookup+0x60/0x60 [ 171.869576] vfs_get_super+0x6e/0x270 [ 171.873365] proc_get_tree+0x88/0xb0 [ 171.877069] vfs_get_tree+0x1cb/0x5c0 [ 171.880867] do_mount+0x6c1/0x1fb0 [ 171.884394] ? kasan_check_write+0x14/0x20 [ 171.888614] ? copy_mount_string+0x40/0x40 [ 171.892843] ? kasan_kmalloc+0xc4/0xe0 [ 171.896714] ? kmem_cache_alloc_trace+0x318/0x780 [ 171.901545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.907081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 171.912606] ? copy_mount_options+0x285/0x380 [ 171.917087] ksys_mount+0x12d/0x140 [ 171.920723] __x64_sys_mount+0xbe/0x150 [ 171.924683] do_syscall_64+0x1b9/0x820 [ 171.928556] ? syscall_slow_exit_work+0x500/0x500 [ 171.933383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 171.938299] ? syscall_return_slowpath+0x31d/0x5e0 [ 171.943216] ? prepare_exit_to_usermode+0x291/0x3b0 [ 171.948221] ? perf_trace_sys_enter+0xb10/0xb10 [ 171.952878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 171.957710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.962900] RIP: 0033:0x455ab9 [ 171.966069] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.985211] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 171.992906] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 172.000175] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 172.007428] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 15:47:53 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff0000000000000000000000000000"], 0x36) 15:47:53 executing program 6: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x1, 0x975b, 0x6, 'queue0\x00', 0x3f}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r3) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000d7c000)={0x0, r3}) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) 15:47:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x5, @empty, 0x1}], 0x1c) fcntl$addseals(r2, 0x409, 0x9) 15:47:53 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) 15:47:53 executing program 5: socketpair(0x8, 0x804, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0xd004, 0x4000}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x101, 0x0, 0x0, {0x3}, [@FOU_ATTR_AF={0x8, 0x5}]}, 0x1c}, 0x1}, 0x0) 15:47:53 executing program 4 (fault-call:11 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:53 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) [ 172.014686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 172.021984] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000009 15:47:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010100000000000000000000000013fac7e584074c339e132d", @ANYRES32=0x0, @ANYBLOB="000000000000000008001a0004000200"], 0x28}, 0x1}, 0x0) [ 172.110110] Dev loop3: unable to read RDB block 1 [ 172.115095] loop3: unable to read partition table [ 172.143581] FAULT_INJECTION: forcing a failure. [ 172.143581] name failslab, interval 1, probability 0, space 0, times 0 15:47:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd4(r1, &(0x7f0000000000)={0x7}, 0x8, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x25, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) [ 172.154986] CPU: 0 PID: 12190 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 172.158671] loop3: partition table beyond EOD, [ 172.163391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.163397] Call Trace: [ 172.163419] dump_stack+0x1c9/0x2b4 [ 172.163434] ? dump_stack_print_info.cold.2+0x52/0x52 [ 172.163457] ? perf_trace_lock+0xde/0x920 [ 172.168128] truncated [ 172.177483] should_fail.cold.4+0xa/0x11 [ 172.177501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 172.177517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 15:47:53 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) [ 172.177537] ? find_next_zero_bit+0x111/0x140 [ 172.180127] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 172.183723] ? do_raw_spin_unlock+0xa7/0x2f0 [ 172.183740] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 172.230864] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 172.235892] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 172.240905] ? find_next_bit+0x104/0x130 [ 172.244962] ? cpumask_next+0x24/0x30 [ 172.248754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.254283] ? pcpu_alloc+0x190/0x13a0 [ 172.258161] ? lock_acquire+0x1e4/0x540 [ 172.262122] ? fs_reclaim_acquire+0x20/0x20 [ 172.266458] ? lock_downgrade+0x8f0/0x8f0 [ 172.270595] ? pcpu_balance_workfn+0x1700/0x1700 [ 172.275343] ? check_same_owner+0x340/0x340 [ 172.279673] ? rcu_note_context_switch+0x730/0x730 [ 172.284591] ? lock_acquire+0x1e4/0x540 [ 172.288575] __should_failslab+0x124/0x180 [ 172.292801] should_failslab+0x9/0x14 [ 172.296587] __kmalloc+0x2c8/0x760 [ 172.300111] ? kasan_check_write+0x14/0x20 [ 172.304329] ? __init_rwsem+0x1cc/0x2a0 [ 172.308290] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 172.313295] ? prealloc_shrinker+0x124/0x480 [ 172.317714] ? __lockdep_init_map+0x105/0x590 [ 172.322210] prealloc_shrinker+0x124/0x480 [ 172.326432] ? __init_waitqueue_head+0x9e/0x150 [ 172.331108] ? inactive_list_is_low+0x850/0x850 [ 172.335764] ? __lockdep_init_map+0x105/0x590 [ 172.340250] alloc_super+0x8dd/0xb10 [ 172.343955] ? destroy_unused_super.part.11+0x110/0x110 [ 172.349305] ? lock_downgrade+0x8f0/0x8f0 [ 172.353443] ? kasan_check_read+0x11/0x20 [ 172.357574] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 172.362145] ? kasan_check_write+0x14/0x20 [ 172.366365] ? do_raw_spin_lock+0xc1/0x200 [ 172.370587] ? ns_test_super+0x50/0x50 [ 172.374460] sget_fc+0x269/0x950 [ 172.377824] ? compare_single+0x10/0x10 [ 172.381802] ? alloc_super+0xb10/0xb10 [ 172.385677] ? kasan_kmalloc+0xc4/0xe0 [ 172.389552] ? __kmalloc_track_caller+0x311/0x760 [ 172.394381] ? proc_root_lookup+0x60/0x60 [ 172.398517] vfs_get_super+0x6e/0x270 [ 172.402304] proc_get_tree+0x88/0xb0 [ 172.406006] vfs_get_tree+0x1cb/0x5c0 [ 172.409801] do_mount+0x6c1/0x1fb0 [ 172.413327] ? check_same_owner+0x340/0x340 [ 172.417636] ? lock_release+0xa30/0xa30 [ 172.421601] ? copy_mount_string+0x40/0x40 [ 172.425822] ? kasan_kmalloc+0xc4/0xe0 [ 172.429696] ? kmem_cache_alloc_trace+0x318/0x780 [ 172.434528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 172.440053] ? _copy_from_user+0xdf/0x150 [ 172.444191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.449716] ? copy_mount_options+0x285/0x380 [ 172.454208] ksys_mount+0x12d/0x140 [ 172.457832] __x64_sys_mount+0xbe/0x150 [ 172.461819] do_syscall_64+0x1b9/0x820 [ 172.465697] ? syscall_slow_exit_work+0x500/0x500 [ 172.470555] ? syscall_return_slowpath+0x5e0/0x5e0 [ 172.475473] ? syscall_return_slowpath+0x31d/0x5e0 [ 172.480390] ? prepare_exit_to_usermode+0x291/0x3b0 [ 172.485397] ? perf_trace_sys_enter+0xb10/0xb10 [ 172.490073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 172.494915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.500090] RIP: 0033:0x455ab9 [ 172.503257] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.522452] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 172.530145] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 172.537483] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 172.544734] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 172.551988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 15:47:53 executing program 6: r0 = socket(0x2, 0x80000000000001, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/117, &(0x7f0000000280)=0x8) open$dir(&(0x7f0000000040)='./file0\x00', 0x400000, 0x44) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x80000) ioctl$TIOCCONS(r1, 0x541d) [ 172.559240] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000a [ 172.573851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 15:47:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setrlimit(0x9, &(0x7f0000000040)={0x7f, 0x6}) r2 = dup(r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000200)={{0x1, 0x7, 0x5, 0x129, 'syz1\x00', 0x4}, 0x3, 0x10000440, 0x0, r3, 0x2, 0x1f, 'syz0\x00', &(0x7f0000000100)=['/dev/kvm\x00', '/dev/kvm\x00'], 0x12, [], [0x1, 0x10000, 0x3ff]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:53 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x80) fallocate(r0, 0x0, 0x0, 0x8001) r1 = request_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='vfat\x00', 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, r2) 15:47:53 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a33261", 0xed, 0x100}]) 15:47:53 executing program 2: pipe2$9p(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u', 0x2c}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f000090b000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000908000/0x4000)=nil, 0x4000, 0x0) read(0xffffffffffffffff, &(0x7f000060df9c)=""/100, 0x64) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) 15:47:53 executing program 0 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 172.700849] FAULT_INJECTION: forcing a failure. [ 172.700849] name failslab, interval 1, probability 0, space 0, times 0 [ 172.712166] CPU: 1 PID: 12226 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 172.720564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.729929] Call Trace: [ 172.732506] dump_stack+0x1c9/0x2b4 [ 172.736124] ? dump_stack_print_info.cold.2+0x52/0x52 [ 172.741313] ? get_pid_task+0xd8/0x1a0 [ 172.745192] ? perf_trace_lock+0xde/0x920 [ 172.749338] should_fail.cold.4+0xa/0x11 [ 172.753397] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 172.758497] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 172.763336] ? lock_downgrade+0x8f0/0x8f0 [ 172.767477] ? proc_fail_nth_write+0x9e/0x210 [ 172.771987] ? lock_acquire+0x1e4/0x540 [ 172.775954] ? fs_reclaim_acquire+0x20/0x20 [ 172.780266] ? lock_downgrade+0x8f0/0x8f0 [ 172.784409] ? check_same_owner+0x340/0x340 [ 172.788718] ? rcu_note_context_switch+0x730/0x730 [ 172.793639] __should_failslab+0x124/0x180 [ 172.797863] should_failslab+0x9/0x14 [ 172.801653] __kmalloc+0x2c8/0x760 [ 172.805183] ? strncpy_from_user+0x510/0x510 [ 172.809595] ? fput+0x130/0x1a0 [ 172.812871] ? __x64_sys_memfd_create+0x142/0x4f0 [ 172.817733] __x64_sys_memfd_create+0x142/0x4f0 [ 172.822400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 172.827934] ? memfd_fcntl+0x1e80/0x1e80 [ 172.832026] do_syscall_64+0x1b9/0x820 [ 172.835913] ? finish_task_switch+0x1d3/0x870 [ 172.840425] ? syscall_return_slowpath+0x5e0/0x5e0 [ 172.845352] ? syscall_return_slowpath+0x31d/0x5e0 [ 172.850275] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 172.855284] ? prepare_exit_to_usermode+0x291/0x3b0 [ 172.860293] ? perf_trace_sys_enter+0xb10/0xb10 [ 172.864984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 172.869829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.875010] RIP: 0033:0x455ab9 [ 172.878187] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.897501] RSP: 002b:00007f2e9bf0ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 172.905202] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000455ab9 [ 172.912478] RDX: 0000000020000458 RSI: 0000000000000000 RDI: 00000000004ba3ac [ 172.919738] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 172.926998] R10: 0000000020000458 R11: 0000000000000246 R12: 0000000000000200 [ 172.934264] R13: 00000000004ba3ac R14: 00000000004d41b8 R15: 0000000000000000 [ 172.964264] Dev loop3: unable to read RDB block 1 [ 172.969253] loop3: unable to read partition table [ 173.004413] loop3: partition table beyond EOD, truncated [ 173.010077] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:47:54 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff0000000000000000000000000000"], 0x36) 15:47:54 executing program 4 (fault-call:11 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:54 executing program 0 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) fsync(r2) unlinkat(r0, &(0x7f00000007c0)='./file0\x00', 0x200) 15:47:54 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x94, 0x0, [0x80ffff]}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000000c0)={0x2, 0x0, [{0xa45, 0x6, 0x0, 0x0, @msi={0x800, 0x4}}, {0x200, 0x2, 0x0, 0x0, @adapter={0x5, 0xb755, 0x7fff, 0x2400, 0x200}}]}) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000080)=0x8) 15:47:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0xe}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4e22, 0x7, 0x4e24, 0x2, 0xa, 0x80, 0x0, 0x16, r1, r2}, {0x4, 0x0, 0x9, 0xae3, 0x5, 0xfff, 0x4, 0x7}, {0x8001, 0x20, 0x1d2}, 0x80000000, 0x6e6bbc, 0x2, 0x1, 0x0, 0x3}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x4d5, 0x6c}, 0x2, @in6, 0x3507, 0x1, 0x1, 0x5e, 0x400, 0x10000, 0x2}}, 0xe8) [ 173.096386] FAULT_INJECTION: forcing a failure. [ 173.096386] name failslab, interval 1, probability 0, space 0, times 0 [ 173.107794] CPU: 0 PID: 12246 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 173.116194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.125554] Call Trace: [ 173.128134] dump_stack+0x1c9/0x2b4 [ 173.131745] ? dump_stack_print_info.cold.2+0x52/0x52 [ 173.136918] ? mnt_get_count+0x150/0x150 [ 173.140965] should_fail.cold.4+0xa/0x11 [ 173.145012] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 173.150100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 173.155102] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 173.159850] ? lock_acquire+0x1e4/0x540 [ 173.163823] ? is_bpf_text_address+0xae/0x170 [ 173.168306] ? lock_downgrade+0x8f0/0x8f0 [ 173.172440] ? lock_release+0xa30/0xa30 [ 173.176399] ? kasan_check_read+0x11/0x20 [ 173.180534] ? lock_acquire+0x1e4/0x540 [ 173.184503] ? fs_reclaim_acquire+0x20/0x20 [ 173.188807] ? lock_downgrade+0x8f0/0x8f0 [ 173.192945] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 173.197947] ? check_same_owner+0x340/0x340 [ 173.202252] ? rcu_note_context_switch+0x730/0x730 [ 173.207164] ? iterate_fd+0x4b0/0x4b0 [ 173.210956] __should_failslab+0x124/0x180 [ 173.215184] should_failslab+0x9/0x14 [ 173.218996] kmem_cache_alloc+0x2af/0x760 [ 173.223138] ? lock_downgrade+0x8f0/0x8f0 [ 173.227277] ? shmem_destroy_callback+0xc0/0xc0 [ 173.231935] shmem_alloc_inode+0x1b/0x40 [ 173.235985] alloc_inode+0x63/0x190 [ 173.239600] new_inode_pseudo+0x71/0x1a0 [ 173.243646] ? prune_icache_sb+0x1b0/0x1b0 [ 173.247875] ? _raw_spin_unlock+0x22/0x30 [ 173.252024] new_inode+0x1c/0x40 [ 173.255381] shmem_get_inode+0xf1/0x910 [ 173.259346] ? shmem_encode_fh+0x340/0x340 [ 173.263572] ? lock_downgrade+0x8f0/0x8f0 [ 173.267708] ? lock_release+0xa30/0xa30 [ 173.271669] ? check_same_owner+0x340/0x340 [ 173.275978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 173.280994] ? __check_object_size+0xa3/0x5d7 [ 173.285487] __shmem_file_setup.part.48+0x83/0x2a0 [ 173.290425] shmem_file_setup+0x65/0x90 [ 173.294391] __x64_sys_memfd_create+0x2af/0x4f0 [ 173.299048] ? memfd_fcntl+0x1e80/0x1e80 [ 173.303099] do_syscall_64+0x1b9/0x820 [ 173.306973] ? finish_task_switch+0x1d3/0x870 [ 173.311456] ? syscall_return_slowpath+0x5e0/0x5e0 [ 173.316375] ? syscall_return_slowpath+0x31d/0x5e0 [ 173.321292] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 173.326295] ? prepare_exit_to_usermode+0x291/0x3b0 [ 173.331298] ? perf_trace_sys_enter+0xb10/0xb10 [ 173.335957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 173.340790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.345963] RIP: 0033:0x455ab9 [ 173.349131] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.368307] RSP: 002b:00007f2e9bf0ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 173.376004] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000455ab9 [ 173.383262] RDX: 0000000020000458 RSI: 0000000000000000 RDI: 00000000004ba3ac [ 173.390518] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 15:47:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) 15:47:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) fsync(r2) unlinkat(r0, &(0x7f00000007c0)='./file0\x00', 0x200) [ 173.397772] R10: 0000000020000458 R11: 0000000000000246 R12: 0000000000000200 [ 173.405028] R13: 00000000004ba3ac R14: 00000000004d41b8 R15: 0000000000000001 15:47:54 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) getpgid(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) timer_create(0x39318d163eb6390a, &(0x7f0000000100)={0x0, 0x33, 0x0, @thr={&(0x7f0000001240)="1214a3bb30abafd63f697f147d31acb315de16e05c8255dac3dbfcb26de9673818bbf4316117072959e7e070f97da9ba606a0f256fff87d25d43b449e4eb023ead702b7266ebcaa5a20153025ee853119a7bbabbddfd954bb60c00a3d023b822ec07cda8fb7057bce9650099c6232cc524656520f97062b04391722f798fa924a74b71a605ddf3c50104728ea6ad5548045ce9c787e3f8f807a3503e5d1b0bb2b515082acf9b40bb5ed0b4c8ae163c1d66e605366e0f3cc96757", &(0x7f0000000080)="ebecf7dbe31a9636f2b4f0b1df6ecf9e50b6a0e5e6cf88a694faee6be5b978a21bc28cfcb45c1e234e808570e76bddfea1d5848493549af4807a65141befa7accf1970e4901e73b8389ee578869c82c650f5"}}, &(0x7f0000c3affc)) 15:47:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) 15:47:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x420000, 0x0) fanotify_mark(r0, 0x1, 0x2, r1, &(0x7f00000000c0)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:54 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = shmget$private(0x0, 0x3000, 0x78000208, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x7, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x5a33}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in={{0x2, 0x4e22}}, 0x7ff, 0x9}, 0x90) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x6000) ioctl$RTC_WIE_OFF(r2, 0x7010) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x101000) 15:47:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee}]) 15:47:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000240)=ANY=[]) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x9) ioctl(r1, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") getrandom(&(0x7f0000000340)=""/200, 0xffffffffffffff1e, 0x3) r2 = socket$inet6(0xa, 0x2, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)}, {&(0x7f0000000200)="3a02a0609464f0bc36249cd236f0446a740c6e74d8a5501bba40aed921e9ef54f0e935927ed47635c2cfb9e64a1033add7be9689168c30cc9bf456db5ebd611076a6618b3026005554a5b5402f29ed1dbb79cb5e16d959535a98", 0x5a}], 0x2) write$P9_RAUTH(r0, &(0x7f0000000000)={0x378, 0x67, 0x1, {0x10, 0x2}}, 0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x3f, 0x8}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000580)={r3, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0xfffffffffffffffb, 0x100000001, 0xfffffffffffffff8, 0x1}, &(0x7f00000004c0)=0x98) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) syz_open_procfs$namespace(r4, &(0x7f0000000540)='ns/uts\x00') getsockopt$bt_hci(r2, 0x0, 0x6, &(0x7f0000000280)=""/134, &(0x7f0000000040)=0x86) [ 173.615266] FAULT_INJECTION: forcing a failure. [ 173.615266] name failslab, interval 1, probability 0, space 0, times 0 [ 173.626684] CPU: 0 PID: 12261 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 173.635096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.644453] Call Trace: [ 173.647053] dump_stack+0x1c9/0x2b4 [ 173.650704] ? dump_stack_print_info.cold.2+0x52/0x52 [ 173.655915] ? trace_hardirqs_on+0xd/0x10 [ 173.660084] should_fail.cold.4+0xa/0x11 [ 173.664166] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 173.669294] ? lock_repin_lock+0x430/0x430 [ 173.673551] ? kasan_check_write+0x14/0x20 [ 173.677809] ? __schedule+0x884/0x1ed0 [ 173.681713] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 173.686753] ? __sched_text_start+0x8/0x8 [ 173.690919] ? pcpu_alloc+0x190/0x13a0 [ 173.694825] ? lock_acquire+0x1e4/0x540 [ 173.698805] ? fs_reclaim_acquire+0x20/0x20 [ 173.703139] ? lock_downgrade+0x8f0/0x8f0 [ 173.707311] ? pcpu_balance_workfn+0x1700/0x1700 [ 173.712088] ? check_same_owner+0x340/0x340 [ 173.716429] ? __lockdep_init_map+0x105/0x590 [ 173.720946] ? lock_acquire+0x1e4/0x540 [ 173.724939] __should_failslab+0x124/0x180 [ 173.729194] should_failslab+0x9/0x14 [ 173.733007] __kmalloc+0x2c8/0x760 [ 173.736553] ? kasan_check_write+0x14/0x20 [ 173.740800] ? __init_rwsem+0x1cc/0x2a0 [ 173.744784] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 173.749821] ? prealloc_shrinker+0x124/0x480 [ 173.754241] ? __lockdep_init_map+0x105/0x590 [ 173.758758] prealloc_shrinker+0x124/0x480 [ 173.763011] ? __init_waitqueue_head+0x9e/0x150 [ 173.767696] ? inactive_list_is_low+0x850/0x850 [ 173.772371] ? __lockdep_init_map+0x105/0x590 [ 173.776875] alloc_super+0x8dd/0xb10 [ 173.780591] ? destroy_unused_super.part.11+0x110/0x110 [ 173.785951] ? lock_downgrade+0x8f0/0x8f0 [ 173.790095] ? kasan_check_read+0x11/0x20 [ 173.794233] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 173.798810] ? kasan_check_write+0x14/0x20 [ 173.803034] ? do_raw_spin_lock+0xc1/0x200 [ 173.807260] ? ns_test_super+0x50/0x50 [ 173.811134] sget_fc+0x269/0x950 [ 173.814522] ? compare_single+0x10/0x10 [ 173.818505] ? alloc_super+0xb10/0xb10 [ 173.822383] ? kasan_kmalloc+0xc4/0xe0 [ 173.826267] ? __kmalloc_track_caller+0x311/0x760 [ 173.831104] ? proc_root_lookup+0x60/0x60 [ 173.835242] vfs_get_super+0x6e/0x270 [ 173.839039] proc_get_tree+0x88/0xb0 [ 173.842744] vfs_get_tree+0x1cb/0x5c0 [ 173.846537] do_mount+0x6c1/0x1fb0 [ 173.850067] ? kasan_check_write+0x14/0x20 [ 173.854295] ? copy_mount_string+0x40/0x40 [ 173.858521] ? retint_kernel+0x10/0x10 [ 173.862404] ? copy_mount_options+0x213/0x380 [ 173.866890] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 173.871636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.877167] ? copy_mount_options+0x285/0x380 [ 173.881658] ksys_mount+0x12d/0x140 [ 173.885279] __x64_sys_mount+0xbe/0x150 [ 173.889265] do_syscall_64+0x1b9/0x820 [ 173.893141] ? finish_task_switch+0x1d3/0x870 [ 173.897645] ? syscall_return_slowpath+0x5e0/0x5e0 [ 173.902567] ? syscall_return_slowpath+0x31d/0x5e0 [ 173.907490] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 173.912504] ? prepare_exit_to_usermode+0x291/0x3b0 [ 173.917515] ? perf_trace_sys_enter+0xb10/0xb10 [ 173.922173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 173.927018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.932196] RIP: 0033:0x455ab9 [ 173.935370] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.954653] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:47:55 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x1}) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x10001, 0x200) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f00000000c0)={'irlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@my=0x1}) 15:47:55 executing program 6: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) pselect6(0x40, &(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)={0x77359400}, &(0x7f0000000000)={&(0x7f0000001140), 0x8}) mlockall(0x3) [ 173.962376] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 173.969635] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 173.976891] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 173.984147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 173.991402] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000b 15:47:55 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff0000000000000000000000000000"], 0x36) 15:47:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:55 executing program 0 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:55 executing program 3 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:55 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x28013, r0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:47:55 executing program 4 (fault-call:11 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x7fff, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, {0xa, 0x4e23, 0x3d, @empty, 0x100}, 0x10000, [0x1, 0x1, 0x401, 0x7, 0x3, 0x8000, 0x3, 0x9]}, 0x5c) r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x9201, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/129, 0x81}], 0x1) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) 15:47:55 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000100)={0x3b, @loopback=0x7f000001, 0x4e21, 0x1, 'wlc\x00', 0x8, 0x5, 0x2f}, 0x2c) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000380)={0x7fff}) [ 174.365368] FAULT_INJECTION: forcing a failure. [ 174.365368] name failslab, interval 1, probability 0, space 0, times 0 [ 174.370092] FAULT_INJECTION: forcing a failure. [ 174.370092] name failslab, interval 1, probability 0, space 0, times 0 [ 174.376672] CPU: 0 PID: 12324 Comm: syz-executor3 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 174.396371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.405725] Call Trace: [ 174.408314] dump_stack+0x1c9/0x2b4 [ 174.411934] ? dump_stack_print_info.cold.2+0x52/0x52 [ 174.417115] ? get_pid_task+0xd8/0x1a0 [ 174.420996] ? perf_trace_lock+0xde/0x920 [ 174.425166] should_fail.cold.4+0xa/0x11 [ 174.429222] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 174.434320] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 174.439156] ? lock_downgrade+0x8f0/0x8f0 [ 174.443300] ? proc_fail_nth_write+0x9e/0x210 [ 174.447800] ? lock_acquire+0x1e4/0x540 [ 174.451770] ? fs_reclaim_acquire+0x20/0x20 [ 174.456086] ? lock_downgrade+0x8f0/0x8f0 [ 174.460230] ? check_same_owner+0x340/0x340 [ 174.464542] ? rcu_note_context_switch+0x730/0x730 [ 174.469463] __should_failslab+0x124/0x180 [ 174.473690] should_failslab+0x9/0x14 [ 174.477500] __kmalloc+0x2c8/0x760 [ 174.481031] ? strncpy_from_user+0x510/0x510 [ 174.485431] ? fput+0x130/0x1a0 [ 174.488703] ? __x64_sys_memfd_create+0x142/0x4f0 [ 174.493544] __x64_sys_memfd_create+0x142/0x4f0 [ 174.498205] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.503742] ? memfd_fcntl+0x1e80/0x1e80 [ 174.507806] do_syscall_64+0x1b9/0x820 [ 174.511685] ? finish_task_switch+0x1d3/0x870 [ 174.516172] ? syscall_return_slowpath+0x5e0/0x5e0 [ 174.521093] ? syscall_return_slowpath+0x31d/0x5e0 [ 174.526018] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 174.531030] ? prepare_exit_to_usermode+0x291/0x3b0 [ 174.536040] ? perf_trace_sys_enter+0xb10/0xb10 [ 174.540704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.545549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.550730] RIP: 0033:0x455ab9 [ 174.553906] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.573156] RSP: 002b:00007f2a2b4e6a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.580857] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000455ab9 [ 174.588117] RDX: 0000000020000458 RSI: 0000000000000000 RDI: 00000000004ba3ac [ 174.595376] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 174.602637] R10: 0000000020000458 R11: 0000000000000246 R12: 0000000000000200 [ 174.609897] R13: 00000000004ba3ac R14: 00000000004d41b8 R15: 0000000000000000 [ 174.617174] CPU: 1 PID: 12327 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 174.619896] binder_alloc: binder_alloc_mmap_handler: 12319 20ffd000-21000000 already mapped failed -16 [ 174.625590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.625595] Call Trace: [ 174.625614] dump_stack+0x1c9/0x2b4 [ 174.625629] ? dump_stack_print_info.cold.2+0x52/0x52 [ 174.625644] ? perf_trace_lock+0xde/0x920 [ 174.625664] should_fail.cold.4+0xa/0x11 [ 174.663949] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 174.669818] ? trace_hardirqs_on+0x10/0x10 [ 174.674042] ? __kernel_text_address+0xd/0x40 [ 174.678548] ? unwind_get_return_address+0x61/0xa0 [ 174.683466] ? __save_stack_trace+0x8d/0xf0 [ 174.687779] ? zap_class+0x740/0x740 [ 174.691481] ? perf_trace_lock+0xde/0x920 [ 174.695616] ? perf_trace_lock+0xde/0x920 [ 174.699753] ? save_stack+0x43/0xd0 [ 174.703368] ? __lockdep_init_map+0x105/0x590 [ 174.707858] ? lock_acquire+0x1e4/0x540 [ 174.711819] ? fs_reclaim_acquire+0x20/0x20 [ 174.716128] ? lock_downgrade+0x8f0/0x8f0 [ 174.720263] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 174.725271] ? check_same_owner+0x340/0x340 [ 174.729581] ? rcu_note_context_switch+0x730/0x730 [ 174.734523] __should_failslab+0x124/0x180 [ 174.738752] should_failslab+0x9/0x14 [ 174.742540] kmem_cache_alloc+0x2af/0x760 [ 174.746678] ? lockdep_init_map+0x9/0x10 [ 174.750725] ? __rwlock_init+0x2d/0x140 [ 174.754692] __d_alloc+0xc8/0xd50 [ 174.758133] ? mpol_set_shared_policy+0x9d0/0x9d0 [ 174.762972] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 174.767978] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 174.773156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.778684] ? timespec64_trunc+0xea/0x180 [ 174.782906] ? inode_init_owner+0x340/0x340 [ 174.787222] ? _raw_spin_unlock+0x22/0x30 [ 174.791360] ? current_time+0x131/0x1b0 [ 174.795322] ? timespec64_trunc+0x180/0x180 [ 174.799632] ? __lockdep_init_map+0x105/0x590 [ 174.804119] d_alloc_pseudo+0x1d/0x30 [ 174.807908] alloc_file_pseudo+0x158/0x3f0 [ 174.812131] ? alloc_file+0x3e0/0x3e0 [ 174.815920] ? check_same_owner+0x340/0x340 [ 174.820231] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 174.825239] ? __check_object_size+0xa3/0x5d7 [ 174.829728] ? kasan_check_write+0x14/0x20 [ 174.833954] __shmem_file_setup.part.48+0x110/0x2a0 [ 174.838980] shmem_file_setup+0x65/0x90 [ 174.842946] __x64_sys_memfd_create+0x2af/0x4f0 [ 174.847602] ? memfd_fcntl+0x1e80/0x1e80 [ 174.851656] do_syscall_64+0x1b9/0x820 [ 174.855530] ? finish_task_switch+0x1d3/0x870 [ 174.860020] ? syscall_return_slowpath+0x5e0/0x5e0 [ 174.864940] ? syscall_return_slowpath+0x31d/0x5e0 [ 174.869860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 174.874862] ? prepare_exit_to_usermode+0x291/0x3b0 [ 174.879869] ? perf_trace_sys_enter+0xb10/0xb10 [ 174.884524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.889360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.894537] RIP: 0033:0x455ab9 [ 174.897708] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.916910] RSP: 002b:00007f2e9bf0ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.924604] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000455ab9 [ 174.931861] RDX: 0000000020000458 RSI: 0000000000000000 RDI: 00000000004ba3ac [ 174.939117] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 174.946373] R10: 0000000020000458 R11: 0000000000000246 R12: 0000000000000200 [ 174.953628] R13: 00000000004ba3ac R14: 00000000004d41b8 R15: 0000000000000002 [ 174.978681] FAULT_INJECTION: forcing a failure. [ 174.978681] name failslab, interval 1, probability 0, space 0, times 0 [ 174.990048] CPU: 1 PID: 12325 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 174.998455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.007802] Call Trace: [ 175.010385] dump_stack+0x1c9/0x2b4 [ 175.014001] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.019192] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 175.024027] ? perf_trace_lock+0xde/0x920 [ 175.028167] should_fail.cold.4+0xa/0x11 [ 175.032224] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.037316] ? perf_trace_lock+0xde/0x920 [ 175.041460] ? zap_class+0x740/0x740 [ 175.045167] ? plist_requeue+0x650/0x650 [ 175.049218] ? perf_trace_lock+0x920/0x920 [ 175.053445] ? save_stack+0xa9/0xd0 [ 175.057066] ? lock_acquire+0x1e4/0x540 [ 175.061031] ? fs_reclaim_acquire+0x20/0x20 [ 175.065339] ? lock_downgrade+0x8f0/0x8f0 [ 175.069480] ? check_same_owner+0x340/0x340 [ 175.073795] ? rcu_note_context_switch+0x730/0x730 [ 175.078718] __should_failslab+0x124/0x180 [ 175.082944] should_failslab+0x9/0x14 [ 175.086736] __kmalloc+0x2c8/0x760 [ 175.090275] ? rcu_note_context_switch+0x730/0x730 [ 175.095201] ? __list_lru_init+0x151/0x840 [ 175.099428] __list_lru_init+0x151/0x840 [ 175.103478] ? list_lru_destroy+0x500/0x500 [ 175.107788] ? prealloc_shrinker+0x124/0x480 [ 175.112192] ? prealloc_shrinker+0x213/0x480 [ 175.116591] ? __init_waitqueue_head+0x9e/0x150 [ 175.121253] ? inactive_list_is_low+0x850/0x850 [ 175.125914] ? __lockdep_init_map+0x105/0x590 [ 175.130405] alloc_super+0x976/0xb10 [ 175.134139] ? destroy_unused_super.part.11+0x110/0x110 [ 175.139493] ? lock_downgrade+0x8f0/0x8f0 [ 175.143634] ? kasan_check_read+0x11/0x20 [ 175.147772] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 175.152355] ? kasan_check_write+0x14/0x20 [ 175.156578] ? do_raw_spin_lock+0xc1/0x200 [ 175.160805] ? ns_test_super+0x50/0x50 [ 175.164681] sget_fc+0x269/0x950 [ 175.168038] ? compare_single+0x10/0x10 [ 175.172006] ? alloc_super+0xb10/0xb10 [ 175.175888] ? kasan_kmalloc+0xc4/0xe0 [ 175.179769] ? __kmalloc_track_caller+0x311/0x760 [ 175.184602] ? proc_root_lookup+0x60/0x60 [ 175.188739] vfs_get_super+0x6e/0x270 [ 175.192531] proc_get_tree+0x88/0xb0 [ 175.196235] vfs_get_tree+0x1cb/0x5c0 [ 175.200030] do_mount+0x6c1/0x1fb0 [ 175.203559] ? kasan_check_write+0x14/0x20 [ 175.207788] ? copy_mount_string+0x40/0x40 [ 175.212018] ? kasan_kmalloc+0xc4/0xe0 [ 175.215901] ? kmem_cache_alloc_trace+0x318/0x780 [ 175.220736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 175.226265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.231789] ? copy_mount_options+0x285/0x380 [ 175.236291] ksys_mount+0x12d/0x140 [ 175.239910] __x64_sys_mount+0xbe/0x150 [ 175.243874] do_syscall_64+0x1b9/0x820 [ 175.247748] ? finish_task_switch+0x1d3/0x870 [ 175.252235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 175.257157] ? syscall_return_slowpath+0x31d/0x5e0 [ 175.262075] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 175.267080] ? prepare_exit_to_usermode+0x291/0x3b0 [ 175.272086] ? perf_trace_sys_enter+0xb10/0xb10 [ 175.276744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.281581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.286757] RIP: 0033:0x455ab9 [ 175.289926] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.309179] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 175.316881] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 15:47:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffc) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 15:47:56 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x8, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@remote={0xfe, 0x80, [], 0xbb}, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x400, 0x8, 0x800, 0x0, 0x6, 0x400009, r1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x82, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000440)=0x8001) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000280)=""/228, &(0x7f0000000080)=0x18) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80b, 0x48000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={@loopback={0x0, 0x1}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @empty, 0x5, 0x3f, 0x6, 0x100, 0x20, 0x40000, r5}) 15:47:56 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:56 executing program 4 (fault-call:11 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 175.324143] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 175.331408] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 175.338665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 175.345918] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000c [ 175.358685] binder_alloc: binder_alloc_mmap_handler: 12319 20ffd000-21000000 already mapped failed -16 15:47:56 executing program 0 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:56 executing program 5: mprotect(&(0x7f0000fee000/0x4000)=nil, 0x4000, 0x0) r0 = socket(0x18, 0x0, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x20000002, 0x21ff) r2 = getpid() r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r4 = mmap$binder(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0x0, 0x6013, r3, 0x81000000) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000080)={{0x6, 0x6, 0x40, 0x3, 'syz0\x00', 0x100000001}, 0x5, 0x1, 0x401, r2, 0x7, 0x1, 'syz1\x00', &(0x7f0000000040)=['\x00', 'nodev\x00', 'self\x00', '\x00', '\x00', 'cgroup&\x00', '\x00'], 0x17, [], [0x8001, 0x6, 0x3ff, 0xffff]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000400)={0x1, 0x2, 0x7f, 0x4, 0x6b8}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x111, 0x11, &(0x7f0000000680), &(0x7f0000000600)=0x7970e4d6) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x4c, 0x0, &(0x7f0000000300)=[@release={0x40046306, 0x1}, @reply={0x40406301, {0x2, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x58, 0x28, &(0x7f0000000280)=[@ptr={0x70742a85, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x9}, @flat={0x73682a85, 0x10a, r4, 0x2}, @fd={0x66642a85, 0x0, r3, 0x0, 0x1}], &(0x7f0000000200)=[0x30, 0x38, 0x38, 0x78, 0x20]}}], 0x0, 0x0, &(0x7f0000000380)}) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000380)) [ 175.453916] FAULT_INJECTION: forcing a failure. [ 175.453916] name failslab, interval 1, probability 0, space 0, times 0 [ 175.465347] CPU: 1 PID: 12350 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 175.473767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.483124] Call Trace: [ 175.485725] dump_stack+0x1c9/0x2b4 [ 175.489371] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.494587] should_fail.cold.4+0xa/0x11 [ 175.498673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.503795] ? __shmem_file_setup.part.48+0x110/0x2a0 [ 175.509005] ? perf_trace_lock+0x920/0x920 [ 175.513261] ? percpu_ref_put_many+0x119/0x240 [ 175.517861] ? lock_downgrade+0x8f0/0x8f0 [ 175.522031] ? lock_release+0xa30/0xa30 [ 175.526028] ? memcg_kmem_get_cache+0x3a9/0x9d0 [ 175.530727] ? mem_cgroup_handle_over_high+0x130/0x130 [ 175.536021] ? fs_reclaim_acquire+0x20/0x20 [ 175.540370] ? lock_acquire+0x1e4/0x540 [ 175.544364] ? fs_reclaim_acquire+0x20/0x20 [ 175.548704] ? lock_downgrade+0x8f0/0x8f0 [ 175.552886] ? check_same_owner+0x340/0x340 [ 175.557228] ? rcu_note_context_switch+0x730/0x730 [ 175.562183] ? kasan_check_read+0x11/0x20 [ 175.566352] __should_failslab+0x124/0x180 [ 175.570609] should_failslab+0x9/0x14 [ 175.574433] kmem_cache_alloc+0x2af/0x760 [ 175.578603] ? _raw_spin_unlock+0x22/0x30 [ 175.582770] ? __d_instantiate+0x522/0x750 [ 175.587032] __get_empty_filp+0x11b/0x620 [ 175.591200] ? d_instantiate+0x79/0xa0 [ 175.595106] ? proc_nr_files+0x60/0x60 [ 175.599021] ? kasan_check_read+0x11/0x20 [ 175.603176] ? do_raw_spin_unlock+0xa7/0x2f0 [ 175.607581] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 175.612168] ? kasan_check_write+0x14/0x20 [ 175.616399] ? do_raw_spin_lock+0xc1/0x200 [ 175.620632] alloc_file+0x29/0x3e0 [ 175.624167] alloc_file_pseudo+0x267/0x3f0 [ 175.628397] ? alloc_file+0x3e0/0x3e0 [ 175.632193] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 175.637202] ? __check_object_size+0xa3/0x5d7 [ 175.641695] ? kasan_check_write+0x14/0x20 [ 175.645928] __shmem_file_setup.part.48+0x110/0x2a0 [ 175.650941] shmem_file_setup+0x65/0x90 [ 175.654910] __x64_sys_memfd_create+0x2af/0x4f0 [ 175.659576] ? memfd_fcntl+0x1e80/0x1e80 [ 175.663641] do_syscall_64+0x1b9/0x820 [ 175.667521] ? finish_task_switch+0x1d3/0x870 [ 175.672013] ? syscall_return_slowpath+0x5e0/0x5e0 [ 175.676937] ? syscall_return_slowpath+0x31d/0x5e0 [ 175.681858] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 175.686866] ? prepare_exit_to_usermode+0x291/0x3b0 [ 175.691876] ? perf_trace_sys_enter+0xb10/0xb10 [ 175.696547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.701389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.706568] RIP: 0033:0x455ab9 [ 175.709740] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.729056] RSP: 002b:00007f2e9bf0ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.736759] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000455ab9 [ 175.744020] RDX: 0000000020000458 RSI: 0000000000000000 RDI: 00000000004ba3ac 15:47:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0xa, 0x8) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="872baa1f8e40b26e559e5a0fdbc84598", 0x10) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.evm\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000000c0)=0x4, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:56 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='./control/file0\x00') fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) sched_setattr(r2, &(0x7f0000000240)={0x30, 0x0, 0x1, 0xffff, 0xb85, 0x8, 0x7, 0x20}, 0x0) close(r0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) 15:47:56 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffff"], 0x51) 15:47:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xfffffffffffffa10, 0x585, 0x4, 0xa0000, 0xffff, 0x6, 0x636, 0x4, 0x8, 0x2, 0x2, 0xfcc}) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000000c0)={0x1f, 0x2}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1300, r0, &(0x7f00000003c0)={0x1000001c}) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 15:47:56 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000200)=""/215, &(0x7f0000000040)=0xd7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8, 0x2001) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) shutdown(r2, 0x1) close(r1) [ 175.751278] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 175.758537] R10: 0000000020000458 R11: 0000000000000246 R12: 0000000000000200 [ 175.765798] R13: 00000000004ba3ac R14: 00000000004d41b8 R15: 0000000000000003 [ 175.782991] Dev loop3: unable to read RDB block 1 [ 175.787960] loop3: AHDI p2 p4 [ 175.791209] loop3: partition table partially beyond EOD, truncated 15:47:57 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000140)={{0x40000000080}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x4010800a}) ftruncate(r0, 0x3) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101840, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) sendmsg$nl_crypto(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=@get={0x118, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {{'drbg_pr_hmac_sha384\x00'}, [], [], 0x2000, 0x2400}, [{0x8, 0x1, 0xff}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x10000}, {0x8, 0x1, 0xff}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x101}]}, 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x48040) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000200)={0x0, 0x0, 'client0\x00', 0x0, "fa5c2c63dd054795", "b82d3a4d7ed844def106c6b9d858ea97cd75b11a88dc3afaafe8be25fe67510d"}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f00000000c0)) r3 = getpid() openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x42000, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x49, 0x7, 0x0, 0x9, 0x0, 0x3, 0x40, 0x8, 0x8000, 0x8001, 0x2, 0x101, 0x7f, 0x800, 0x5, 0xffffffffffffb768, 0x0, 0x1, 0x3f, 0x0, 0x10001, 0x8, 0xbf3d, 0xcf, 0x2, 0xdbc, 0x1000, 0x6, 0xf5, 0xffffffffffff833f, 0xfffffffffffffff7, 0x5, 0x100000000, 0x8, 0x100000000, 0x1, 0x0, 0x8001, 0x5, @perf_bp={&(0x7f00000004c0), 0x1}, 0x10000, 0x7fffffff, 0x4, 0x3, 0x200, 0x9, 0x89}, r3, 0x0, r2, 0x9) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 175.821293] FAULT_INJECTION: forcing a failure. [ 175.821293] name failslab, interval 1, probability 0, space 0, times 0 [ 175.832630] CPU: 1 PID: 12362 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 175.841040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.850396] Call Trace: [ 175.852999] dump_stack+0x1c9/0x2b4 [ 175.856647] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.861859] ? perf_trace_lock+0xde/0x920 [ 175.866034] should_fail.cold.4+0xa/0x11 [ 175.870125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.875264] ? save_stack+0xa9/0xd0 [ 175.878910] ? save_stack+0x43/0xd0 [ 175.882558] ? kasan_kmalloc+0xc4/0xe0 [ 175.886455] ? kmem_cache_alloc_trace+0x152/0x780 [ 175.891308] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 175.896512] ? __list_lru_init+0x4d6/0x840 [ 175.900764] ? alloc_super+0x976/0xb10 [ 175.902224] loop3: p2 start 2020327233 is beyond EOD, [ 175.904662] ? vfs_get_super+0x6e/0x270 [ 175.904679] ? proc_get_tree+0x88/0xb0 [ 175.904700] ? do_mount+0x6c1/0x1fb0 15:47:57 executing program 0 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 175.909991] truncated [ 175.913938] ? ksys_mount+0x12d/0x140 [ 175.913952] ? __x64_sys_mount+0xbe/0x150 [ 175.913967] ? do_syscall_64+0x1b9/0x820 [ 175.913989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.941283] ? lock_acquire+0x1e4/0x540 [ 175.945271] ? fs_reclaim_acquire+0x20/0x20 [ 175.949613] ? lock_downgrade+0x8f0/0x8f0 [ 175.953521] FAULT_INJECTION: forcing a failure. [ 175.953521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.953795] ? __x64_sys_mount+0xbe/0x150 [ 175.969723] ? check_same_owner+0x340/0x340 [ 175.974046] ? rcu_note_context_switch+0x730/0x730 [ 175.978970] __should_failslab+0x124/0x180 [ 175.983199] should_failslab+0x9/0x14 [ 175.986992] kmem_cache_alloc_trace+0x2cb/0x780 [ 175.991655] ? kasan_kmalloc+0xc4/0xe0 [ 175.995539] __memcg_init_list_lru_node+0x185/0x2d0 [ 176.000552] ? kvfree_rcu+0x20/0x20 [ 176.004170] ? __kmalloc_node+0x47/0x70 [ 176.008139] __list_lru_init+0x4d6/0x840 [ 176.012196] ? list_lru_destroy+0x500/0x500 [ 176.016517] ? prealloc_shrinker+0x213/0x480 [ 176.020913] ? __init_waitqueue_head+0x9e/0x150 [ 176.025577] ? inactive_list_is_low+0x850/0x850 [ 176.030241] ? __lockdep_init_map+0x105/0x590 [ 176.034732] alloc_super+0x976/0xb10 [ 176.038444] ? destroy_unused_super.part.11+0x110/0x110 [ 176.043801] ? lock_downgrade+0x8f0/0x8f0 [ 176.047945] ? kasan_check_read+0x11/0x20 [ 176.052091] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 176.056669] ? kasan_check_write+0x14/0x20 [ 176.060895] ? do_raw_spin_lock+0xc1/0x200 [ 176.065125] ? ns_test_super+0x50/0x50 [ 176.069002] sget_fc+0x269/0x950 [ 176.072361] ? compare_single+0x10/0x10 [ 176.076327] ? alloc_super+0xb10/0xb10 [ 176.080207] ? kasan_kmalloc+0xc4/0xe0 [ 176.084092] ? __kmalloc_track_caller+0x311/0x760 [ 176.088931] ? proc_root_lookup+0x60/0x60 [ 176.093072] vfs_get_super+0x6e/0x270 [ 176.096868] proc_get_tree+0x88/0xb0 [ 176.100589] vfs_get_tree+0x1cb/0x5c0 [ 176.104384] do_mount+0x6c1/0x1fb0 [ 176.107935] ? check_same_owner+0x340/0x340 [ 176.112253] ? lock_release+0xa30/0xa30 [ 176.116235] ? copy_mount_string+0x40/0x40 [ 176.120467] ? retint_kernel+0x10/0x10 [ 176.124349] ? copy_mount_options+0x213/0x380 [ 176.128840] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 176.133674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.139206] ? copy_mount_options+0x285/0x380 [ 176.143698] ksys_mount+0x12d/0x140 [ 176.147320] __x64_sys_mount+0xbe/0x150 [ 176.151293] do_syscall_64+0x1b9/0x820 [ 176.155171] ? finish_task_switch+0x1d3/0x870 [ 176.159660] ? syscall_return_slowpath+0x5e0/0x5e0 [ 176.164585] ? syscall_return_slowpath+0x31d/0x5e0 [ 176.169509] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 176.174521] ? prepare_exit_to_usermode+0x291/0x3b0 [ 176.179532] ? perf_trace_sys_enter+0xb10/0xb10 [ 176.184195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.189056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.194242] RIP: 0033:0x455ab9 [ 176.197415] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.216664] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 176.224377] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 176.231640] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 176.238903] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 176.246175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 176.253451] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000d [ 176.260733] CPU: 0 PID: 12380 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 176.269146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.278508] Call Trace: [ 176.281105] dump_stack+0x1c9/0x2b4 [ 176.284746] ? dump_stack_print_info.cold.2+0x52/0x52 [ 176.289947] ? perf_trace_lock+0xde/0x920 [ 176.294112] ? update_load_avg+0x2de/0x2590 [ 176.298444] should_fail.cold.4+0xa/0x11 [ 176.302498] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.307598] ? lock_acquire+0x1e4/0x540 [ 176.311571] ? find_get_entry+0xa6d/0x1120 [ 176.315800] ? lock_downgrade+0x8f0/0x8f0 [ 176.319934] ? trace_hardirqs_on+0x10/0x10 [ 176.324154] ? lock_release+0xa30/0xa30 [ 176.328143] ? lock_acquire+0x1e4/0x540 [ 176.332103] ? fs_reclaim_acquire+0x20/0x20 [ 176.336411] ? lock_downgrade+0x8f0/0x8f0 [ 176.340612] ? check_same_owner+0x340/0x340 [ 176.344938] ? rcu_note_context_switch+0x730/0x730 [ 176.349874] __alloc_pages_nodemask+0x36e/0xdb0 [ 176.354534] ? lock_release+0xa30/0xa30 [ 176.358499] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 176.363503] ? rcu_is_watching+0x8c/0x150 [ 176.367641] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 176.372298] ? trace_hardirqs_on+0x10/0x10 [ 176.376528] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 176.381533] ? percpu_counter_add_batch+0xf2/0x150 [ 176.386453] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 176.391457] ? __vm_enough_memory+0x590/0x980 [ 176.395941] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 176.401466] alloc_pages_vma+0xdd/0x540 [ 176.405434] shmem_alloc_page+0xa8/0x190 [ 176.409486] ? shmem_swapin+0x230/0x230 [ 176.413447] ? do_sys_open+0x584/0x720 [ 176.417334] shmem_alloc_and_acct_page+0x1f1/0x820 [ 176.422253] ? shmem_getattr+0x2c0/0x2c0 [ 176.426300] ? mem_cgroup_id_get_many+0x160/0x160 [ 176.431136] shmem_getpage_gfp+0x6ea/0x3ec0 [ 176.435451] ? shmem_writepage+0x13a0/0x13a0 [ 176.439846] ? __unlock_page_memcg+0x72/0x100 [ 176.444328] ? unlock_page_memcg+0x2c/0x40 [ 176.448559] ? trace_hardirqs_on+0x10/0x10 [ 176.452780] ? zap_class+0x740/0x740 [ 176.456484] ? zap_class+0x740/0x740 [ 176.460216] ? trace_hardirqs_on+0x10/0x10 [ 176.464441] ? trace_hardirqs_on+0x10/0x10 [ 176.468670] ? perf_trace_lock+0xde/0x920 [ 176.472835] ? trace_hardirqs_on+0x10/0x10 [ 176.477060] ? zap_class+0x740/0x740 [ 176.480762] ? xas_descend+0x20c/0x5f0 [ 176.484643] ? perf_trace_lock+0xde/0x920 [ 176.488782] ? trace_hardirqs_on+0x10/0x10 [ 176.493006] ? zap_class+0x740/0x740 [ 176.496715] ? trace_hardirqs_on+0x10/0x10 [ 176.500936] ? perf_trace_lock+0xde/0x920 [ 176.505072] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 176.510078] ? perf_trace_lock+0xde/0x920 [ 176.514217] ? zap_class+0x740/0x740 [ 176.517920] ? zap_class+0x740/0x740 [ 176.521619] ? is_bpf_text_address+0xae/0x170 [ 176.526125] ? lock_downgrade+0x8f0/0x8f0 [ 176.530501] ? trace_hardirqs_on+0x10/0x10 [ 176.534727] ? trace_hardirqs_on+0x10/0x10 [ 176.538952] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 176.543618] ? current_time+0x72/0x1b0 [ 176.547494] ? lock_downgrade+0x8f0/0x8f0 [ 176.551633] ? kasan_check_read+0x11/0x20 [ 176.555773] ? lock_release+0xa30/0xa30 [ 176.559737] ? kasan_check_write+0x14/0x20 [ 176.563959] ? do_raw_spin_lock+0xc1/0x200 [ 176.568187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 176.573713] ? iov_iter_fault_in_readable+0x23d/0x460 [ 176.578889] ? copy_page_from_iter+0x890/0x890 [ 176.583457] ? __sanitizer_cov_trace_pc+0x4c/0x50 [ 176.588289] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 176.593475] shmem_write_begin+0x10a/0x1e0 [ 176.597702] generic_perform_write+0x3ae/0x6c0 [ 176.602278] ? add_page_wait_queue+0x2c0/0x2c0 [ 176.606871] ? file_update_time+0xe4/0x640 [ 176.611094] ? current_time+0x1b0/0x1b0 [ 176.615064] ? down_write+0x8f/0x130 [ 176.618770] __generic_file_write_iter+0x26e/0x630 [ 176.623690] generic_file_write_iter+0x438/0x870 [ 176.628441] ? __generic_file_write_iter+0x630/0x630 [ 176.633544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 176.639074] ? iov_iter_init+0xc9/0x1f0 [ 176.643046] __vfs_write+0x6af/0x9d0 [ 176.646752] ? kernel_read+0x120/0x120 [ 176.650629] ? lock_release+0xa30/0xa30 [ 176.654591] ? check_same_owner+0x340/0x340 [ 176.658901] ? __fget_light+0x2f7/0x440 [ 176.662867] ? fget_raw+0x20/0x20 [ 176.666312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.671857] ? __sb_start_write+0x17f/0x300 [ 176.676168] vfs_write+0x1fc/0x560 [ 176.679698] ksys_pwrite64+0x181/0x1b0 [ 176.683576] ? __ia32_sys_pread64+0xf0/0xf0 [ 176.687884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 176.693412] ? fput+0x130/0x1a0 [ 176.696683] ? do_sys_ftruncate+0x44e/0x560 [ 176.700990] __x64_sys_pwrite64+0x97/0xf0 [ 176.705128] do_syscall_64+0x1b9/0x820 [ 176.709005] ? finish_task_switch+0x1d3/0x870 [ 176.713495] ? syscall_return_slowpath+0x5e0/0x5e0 [ 176.718414] ? syscall_return_slowpath+0x31d/0x5e0 [ 176.723332] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 176.728357] ? prepare_exit_to_usermode+0x291/0x3b0 [ 176.733361] ? perf_trace_sys_enter+0xb10/0xb10 [ 176.738028] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.742867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.748045] RIP: 0033:0x40fd77 [ 176.751214] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:47:58 executing program 4 (fault-call:11 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 176.770430] RSP: 002b:00007f2e9bf0ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 176.778130] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 000000000040fd77 [ 176.785388] RDX: 00000000000000ee RSI: 0000000020000000 RDI: 0000000000000014 [ 176.792903] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 176.800159] R10: 0000000000000100 R11: 0000000000000293 R12: 00007f2e9bf0d6d4 [ 176.807433] R13: 0000000000000014 R14: 0000000000000014 R15: 0000000000000000 15:47:58 executing program 2: r0 = socket$inet6(0xa, 0x80f, 0xfffffffffffffffe) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0x9, 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="005c8f2380345f8f762070") r3 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f000000affc)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f000026c000)=[{r5}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f000016a000), 0x8) ppoll(&(0x7f0000000040)=[{r5}, {r5}, {r4}], 0x3, &(0x7f0000000080), &(0x7f00000000c0), 0x8) getsockopt$inet_buf(r1, 0x0, 0x9, &(0x7f0000000100)=""/230, &(0x7f0000000040)=0xe6) ioctl(r0, 0x4000008913, &(0x7f00000000c0)="295ee1311f16f477671070") r7 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0xa, 0x1) setsockopt$inet_tcp_int(r6, 0x6, 0x100000000000e, &(0x7f0000000240)=0x12, 0xfffffd03) fcntl$F_GET_FILE_RW_HINT(r7, 0x40d, &(0x7f0000000200)) getsockopt$inet_tcp_int(r7, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 15:47:58 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000140)={0x4, 0x80000000, 0x200, 'queue0\x00', 0x1}) [ 176.880867] FAULT_INJECTION: forcing a failure. [ 176.880867] name failslab, interval 1, probability 0, space 0, times 0 [ 176.892215] CPU: 1 PID: 12390 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 176.900622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.909977] Call Trace: [ 176.912558] dump_stack+0x1c9/0x2b4 [ 176.916175] ? dump_stack_print_info.cold.2+0x52/0x52 [ 176.921358] should_fail.cold.4+0xa/0x11 [ 176.925410] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.930500] ? is_bpf_text_address+0xd7/0x170 [ 176.934995] ? kernel_text_address+0x79/0xf0 [ 176.939430] ? __kernel_text_address+0xd/0x40 [ 176.943936] ? unwind_get_return_address+0x61/0xa0 [ 176.948853] ? __save_stack_trace+0x8d/0xf0 [ 176.953168] ? save_stack+0xa9/0xd0 [ 176.956789] ? lock_acquire+0x1e4/0x540 [ 176.960752] ? fs_reclaim_acquire+0x20/0x20 [ 176.965066] ? lock_downgrade+0x8f0/0x8f0 [ 176.969220] ? __x64_sys_mount+0xbe/0x150 [ 176.973387] ? check_same_owner+0x340/0x340 [ 176.977702] ? rcu_note_context_switch+0x730/0x730 [ 176.982622] __should_failslab+0x124/0x180 [ 176.986847] should_failslab+0x9/0x14 [ 176.990637] kmem_cache_alloc_trace+0x2cb/0x780 [ 176.995290] ? kasan_kmalloc+0xc4/0xe0 [ 176.999186] __memcg_init_list_lru_node+0x185/0x2d0 [ 177.004186] ? kvfree_rcu+0x20/0x20 [ 177.007799] ? __kmalloc_node+0x47/0x70 [ 177.011764] __list_lru_init+0x4d6/0x840 [ 177.015815] ? list_lru_destroy+0x500/0x500 [ 177.020127] ? prealloc_shrinker+0x213/0x480 [ 177.024522] ? __init_waitqueue_head+0x9e/0x150 [ 177.029177] ? inactive_list_is_low+0x850/0x850 [ 177.033834] ? __lockdep_init_map+0x105/0x590 [ 177.038330] alloc_super+0x976/0xb10 [ 177.042040] ? destroy_unused_super.part.11+0x110/0x110 [ 177.047392] ? lock_downgrade+0x8f0/0x8f0 [ 177.051530] ? kasan_check_read+0x11/0x20 [ 177.055678] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 177.060248] ? kasan_check_write+0x14/0x20 [ 177.064467] ? do_raw_spin_lock+0xc1/0x200 [ 177.068691] ? ns_test_super+0x50/0x50 [ 177.072566] sget_fc+0x269/0x950 [ 177.075920] ? compare_single+0x10/0x10 [ 177.079898] ? alloc_super+0xb10/0xb10 [ 177.083774] ? kasan_kmalloc+0xc4/0xe0 [ 177.087650] ? __kmalloc_track_caller+0x311/0x760 [ 177.092482] ? proc_root_lookup+0x60/0x60 [ 177.096617] vfs_get_super+0x6e/0x270 [ 177.100403] proc_get_tree+0x88/0xb0 [ 177.104102] vfs_get_tree+0x1cb/0x5c0 [ 177.107891] do_mount+0x6c1/0x1fb0 [ 177.111419] ? kasan_check_write+0x14/0x20 [ 177.115658] ? copy_mount_string+0x40/0x40 [ 177.119879] ? kasan_kmalloc+0xc4/0xe0 [ 177.123757] ? kmem_cache_alloc_trace+0x318/0x780 [ 177.128589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 177.134119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.139643] ? copy_mount_options+0x285/0x380 [ 177.144127] ksys_mount+0x12d/0x140 [ 177.147743] __x64_sys_mount+0xbe/0x150 [ 177.151705] do_syscall_64+0x1b9/0x820 [ 177.155582] ? finish_task_switch+0x1d3/0x870 [ 177.160065] ? syscall_return_slowpath+0x5e0/0x5e0 [ 177.164982] ? syscall_return_slowpath+0x31d/0x5e0 [ 177.169903] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 177.174927] ? prepare_exit_to_usermode+0x291/0x3b0 [ 177.179934] ? perf_trace_sys_enter+0xb10/0xb10 [ 177.184594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 177.189435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.194614] RIP: 0033:0x455ab9 [ 177.197787] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.217010] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 177.224736] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 15:47:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e22, 0x7fffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, {0xa, 0x4e20, 0xa00000000, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x7f, [0x4000000000000000, 0x20, 0x0, 0x5, 0x1, 0x8, 0x3, 0x5]}, 0x5c) [ 177.232020] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 177.239278] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 177.246537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 177.253792] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000e 15:47:58 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffff"], 0x51) 15:47:58 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 177.285971] Dev loop3: unable to read RDB block 1 [ 177.290961] loop3: AHDI p2 p4 [ 177.294271] loop3: partition table partially beyond EOD, truncated [ 177.330118] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xa0b8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2}, &(0x7f0000000140)=0x8) 15:47:58 executing program 4 (fault-call:11 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$peekuser(0x3, r1, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x1, 0x6}, 0xc) splice(r0, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x8000, 0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x4, 0x8, 0x3, 0x4}, 0x8) [ 177.380781] Dev loop3: unable to read RDB block 1 [ 177.385760] loop3: AHDI p2 p4 [ 177.389011] loop3: partition table partially beyond EOD, truncated [ 177.404449] Dev loop0: unable to read RDB block 1 [ 177.409471] loop0: AHDI p2 p4 [ 177.412839] loop0: partition table partially beyond EOD, truncated [ 177.426819] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000003c0)=0x4) [ 177.455798] loop0: p2 start 2020327233 is beyond EOD, truncated [ 177.505667] FAULT_INJECTION: forcing a failure. [ 177.505667] name failslab, interval 1, probability 0, space 0, times 0 [ 177.517056] CPU: 0 PID: 12428 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 177.525476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.534832] Call Trace: [ 177.537431] dump_stack+0x1c9/0x2b4 [ 177.541062] ? dump_stack_print_info.cold.2+0x52/0x52 [ 177.546252] ? __kernel_text_address+0xd/0x40 [ 177.550738] ? unwind_get_return_address+0x61/0xa0 [ 177.555658] should_fail.cold.4+0xa/0x11 [ 177.559711] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 177.564807] ? save_stack+0xa9/0xd0 [ 177.568426] ? save_stack+0x43/0xd0 [ 177.572042] ? kasan_kmalloc+0xc4/0xe0 [ 177.575945] ? kmem_cache_alloc_trace+0x152/0x780 [ 177.580798] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 177.585978] ? __list_lru_init+0x4d6/0x840 [ 177.590203] ? alloc_super+0x976/0xb10 [ 177.594081] ? vfs_get_super+0x6e/0x270 [ 177.598045] ? proc_get_tree+0x88/0xb0 [ 177.601916] ? vfs_get_tree+0x1cb/0x5c0 [ 177.605879] ? do_mount+0x6c1/0x1fb0 [ 177.609580] ? ksys_mount+0x12d/0x140 [ 177.613368] ? __x64_sys_mount+0xbe/0x150 [ 177.617505] ? do_syscall_64+0x1b9/0x820 [ 177.621574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.626932] ? save_stack+0xa9/0xd0 [ 177.630556] ? lock_acquire+0x1e4/0x540 [ 177.634519] ? fs_reclaim_acquire+0x20/0x20 [ 177.638831] ? lock_downgrade+0x8f0/0x8f0 [ 177.642984] ? __x64_sys_mount+0xbe/0x150 [ 177.647138] ? check_same_owner+0x340/0x340 [ 177.651477] ? rcu_note_context_switch+0x730/0x730 [ 177.656398] __should_failslab+0x124/0x180 [ 177.660624] should_failslab+0x9/0x14 [ 177.664416] kmem_cache_alloc_trace+0x2cb/0x780 [ 177.669081] ? kasan_kmalloc+0xc4/0xe0 [ 177.672962] __memcg_init_list_lru_node+0x185/0x2d0 [ 177.677967] ? kvfree_rcu+0x20/0x20 [ 177.681584] ? __kmalloc_node+0x47/0x70 [ 177.685545] __list_lru_init+0x4d6/0x840 [ 177.689598] ? list_lru_destroy+0x500/0x500 [ 177.693911] ? prealloc_shrinker+0x213/0x480 [ 177.698307] ? __init_waitqueue_head+0x9e/0x150 [ 177.702963] ? inactive_list_is_low+0x850/0x850 [ 177.707625] ? __lockdep_init_map+0x105/0x590 [ 177.712113] alloc_super+0x976/0xb10 [ 177.715825] ? destroy_unused_super.part.11+0x110/0x110 [ 177.721191] ? lock_downgrade+0x8f0/0x8f0 [ 177.725336] ? kasan_check_read+0x11/0x20 [ 177.729488] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 177.734077] ? kasan_check_write+0x14/0x20 [ 177.738298] ? do_raw_spin_lock+0xc1/0x200 [ 177.742526] ? ns_test_super+0x50/0x50 [ 177.746404] sget_fc+0x269/0x950 [ 177.749777] ? compare_single+0x10/0x10 [ 177.753740] ? alloc_super+0xb10/0xb10 [ 177.757620] ? kasan_kmalloc+0xc4/0xe0 [ 177.761498] ? __kmalloc_track_caller+0x311/0x760 [ 177.766330] ? proc_root_lookup+0x60/0x60 [ 177.770469] vfs_get_super+0x6e/0x270 [ 177.774260] proc_get_tree+0x88/0xb0 [ 177.777962] vfs_get_tree+0x1cb/0x5c0 [ 177.781753] do_mount+0x6c1/0x1fb0 [ 177.785279] ? check_same_owner+0x340/0x340 [ 177.789593] ? copy_mount_string+0x40/0x40 [ 177.793834] ? retint_kernel+0x10/0x10 [ 177.797713] ? copy_mount_options+0x213/0x380 [ 177.802193] ? write_comp_data+0x6c/0x70 [ 177.806243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.811768] ? copy_mount_options+0x285/0x380 [ 177.816257] ksys_mount+0x12d/0x140 [ 177.819873] __x64_sys_mount+0xbe/0x150 [ 177.823835] do_syscall_64+0x1b9/0x820 [ 177.827712] ? finish_task_switch+0x1d3/0x870 [ 177.832194] ? syscall_return_slowpath+0x5e0/0x5e0 [ 177.837113] ? syscall_return_slowpath+0x31d/0x5e0 [ 177.842031] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 177.847035] ? prepare_exit_to_usermode+0x291/0x3b0 [ 177.852038] ? perf_trace_sys_enter+0xb10/0xb10 [ 177.856694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 177.861529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.866706] RIP: 0033:0x455ab9 [ 177.869876] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.889237] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 177.896931] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 15:47:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) accept(r0, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000040)=0x7f, 0x4) sendmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000240)}}], 0x1, 0x0) 15:47:59 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8000, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)={0x6, 0xffffffff80000000}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x40, 0x3, 0xd54, 0x800, 0x3, &(0x7f00000001c0)='bond0\x00', 0x9, 0x8}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x8, 0x4) 15:47:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$getflags(r0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x0) bind$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x2, @multicast1=0xe0000001}}, 0x1e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 177.904186] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 177.911442] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 177.918697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 177.925970] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000f 15:47:59 executing program 4 (fault-call:11 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:47:59 executing program 0: syz_read_part_table(0x7a00000000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 178.001877] Dev loop3: unable to read RDB block 1 [ 178.006866] loop3: AHDI p2 p4 [ 178.010108] loop3: partition table partially beyond EOD, truncated [ 178.035469] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:59 executing program 6: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$int_out(r0, 0xc0305710, &(0x7f0000000100)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200c00) ppoll(&(0x7f0000000180)=[{r1, 0x80}, {r1, 0x8}, {r1, 0x1}, {r0, 0x4008}, {r2, 0x4}], 0x5, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={0x6}, 0x8) [ 178.087830] loop0: AHDI p2 p4 [ 178.091525] loop0: p2 start 2020327233 is beyond EOD, truncated 15:47:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00003c3000/0x2000)=nil, 0x2000, 0x4, 0x40010, r0, 0x39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000458000/0x2000)=nil, 0x2000, 0x0) [ 178.139641] binder_alloc: binder_alloc_mmap_handler: 12463 20000000-20002000 already mapped failed -16 [ 178.154432] Dev loop3: unable to read RDB block 1 [ 178.159428] loop3: AHDI p2 p4 [ 178.162670] loop3: partition table partially beyond EOD, truncated [ 178.177862] loop0: AHDI p2 p4 [ 178.181542] loop0: p2 start 2020327233 is beyond EOD, truncated [ 178.199641] binder: 12463:12471 ioctl c0305710 20000100 returned -22 [ 178.223229] loop3: p2 start 2020327233 is beyond EOD, truncated 15:47:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0x4008ae48, 0x906ffd) 15:47:59 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffff"], 0x51) 15:47:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x400200) ioctl$RTC_UIE_OFF(r0, 0x7004) write$FUSE_DIRENT(r0, &(0x7f0000000100)={0x78, 0x0, 0x6, [{0x4, 0x6, 0x0, 0xc8ad}, {0x5, 0x2, 0xe, 0xfffffffffffffffb, "747275737465646e6f6465765ef8"}, {0x6, 0x0, 0x9, 0x380, '/dev/kvm\x00'}]}, 0x78) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:47:59 executing program 0: syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:47:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x20000000000003, 0x0) write(r1, &(0x7f00000000c0)="220000005e000721004f10f7d0ebd900000000003c0253573d9a047c26485a3d5728", 0x22) r2 = creat(&(0x7f0000000040)='./file0\x00', 0xa0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000100)={0x40002000}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14b0000022000100000000000000000004000000ddbeba4603a7c45ecfc7340ada889f3ca72d2a598263d4a4fdcbc7ede5e33621641c4653b16558a12918dbb06662813644478bb7a29d10dc08b64d020df8e5b11e88881403e8f8d8d4bd77e211c077e4b52a2c737507515c5e36f358d86883dc4469e09dd161c9c6e97f49b82a20"], 0x14}, 0x1}, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000000)={'team_slave_0\x00', @ifru_map={0x8, 0x3, 0x9, 0x200, 0x1000, 0x8000}}) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000840)=""/198, 0xc6}, 0x0) 15:47:59 executing program 3: syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101040, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x100000001, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x1ff, 0x0, 0x1, 0xa0, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0xfff}, &(0x7f0000000280)=0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6f, 0x82002) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x6ab2) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x5) 15:47:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x40003) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) [ 178.438284] FAULT_INJECTION: forcing a failure. [ 178.438284] name failslab, interval 1, probability 0, space 0, times 0 [ 178.449639] CPU: 1 PID: 12491 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 178.458054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.467413] Call Trace: [ 178.470003] dump_stack+0x1c9/0x2b4 [ 178.473631] ? dump_stack_print_info.cold.2+0x52/0x52 [ 178.478820] ? perf_trace_lock+0xde/0x920 [ 178.482961] should_fail.cold.4+0xa/0x11 [ 178.487049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 178.492144] ? save_stack+0xa9/0xd0 [ 178.495759] ? save_stack+0x43/0xd0 [ 178.499375] ? kasan_kmalloc+0xc4/0xe0 [ 178.503249] ? kmem_cache_alloc_trace+0x152/0x780 [ 178.508081] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 178.513260] ? __list_lru_init+0x4d6/0x840 [ 178.517487] ? alloc_super+0x976/0xb10 [ 178.521374] ? vfs_get_super+0x6e/0x270 [ 178.525342] ? proc_get_tree+0x88/0xb0 [ 178.529226] ? do_mount+0x6c1/0x1fb0 [ 178.532930] ? ksys_mount+0x12d/0x140 [ 178.536748] ? __x64_sys_mount+0xbe/0x150 [ 178.540898] ? do_syscall_64+0x1b9/0x820 [ 178.544952] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.550314] ? lock_acquire+0x1e4/0x540 [ 178.554278] ? fs_reclaim_acquire+0x20/0x20 [ 178.558588] ? lock_downgrade+0x8f0/0x8f0 [ 178.562726] ? __x64_sys_mount+0xbe/0x150 [ 178.566871] ? check_same_owner+0x340/0x340 [ 178.571185] ? rcu_note_context_switch+0x730/0x730 [ 178.576106] __should_failslab+0x124/0x180 [ 178.580335] should_failslab+0x9/0x14 [ 178.584126] kmem_cache_alloc_trace+0x2cb/0x780 [ 178.588785] ? kasan_kmalloc+0xc4/0xe0 [ 178.592666] __memcg_init_list_lru_node+0x185/0x2d0 [ 178.597669] ? kvfree_rcu+0x20/0x20 [ 178.601284] ? __kmalloc_node+0x47/0x70 [ 178.605248] __list_lru_init+0x4d6/0x840 [ 178.609300] ? list_lru_destroy+0x500/0x500 [ 178.613616] ? prealloc_shrinker+0x213/0x480 [ 178.618027] ? __init_waitqueue_head+0x9e/0x150 [ 178.622687] ? inactive_list_is_low+0x850/0x850 [ 178.627346] ? __lockdep_init_map+0x105/0x590 [ 178.631831] alloc_super+0x976/0xb10 [ 178.635543] ? destroy_unused_super.part.11+0x110/0x110 [ 178.640896] ? lock_downgrade+0x8f0/0x8f0 [ 178.645037] ? kasan_check_read+0x11/0x20 [ 178.649173] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 178.653746] ? kasan_check_write+0x14/0x20 [ 178.657968] ? do_raw_spin_lock+0xc1/0x200 [ 178.662191] ? ns_test_super+0x50/0x50 [ 178.666068] sget_fc+0x269/0x950 [ 178.669962] ? compare_single+0x10/0x10 [ 178.673930] ? alloc_super+0xb10/0xb10 [ 178.677806] ? kasan_kmalloc+0xc4/0xe0 [ 178.681682] ? __kmalloc_track_caller+0x311/0x760 [ 178.686540] ? proc_root_lookup+0x60/0x60 [ 178.690675] vfs_get_super+0x6e/0x270 [ 178.694464] proc_get_tree+0x88/0xb0 [ 178.698166] vfs_get_tree+0x1cb/0x5c0 [ 178.701953] do_mount+0x6c1/0x1fb0 [ 178.705485] ? check_same_owner+0x340/0x340 [ 178.709793] ? lock_release+0xa30/0xa30 [ 178.713756] ? copy_mount_string+0x40/0x40 [ 178.717988] ? retint_kernel+0x10/0x10 [ 178.721892] ? copy_mount_options+0x1f0/0x380 [ 178.726393] ? copy_mount_options+0x1f6/0x380 [ 178.730877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.736419] ? copy_mount_options+0x285/0x380 [ 178.740906] ksys_mount+0x12d/0x140 [ 178.744521] __x64_sys_mount+0xbe/0x150 [ 178.748486] do_syscall_64+0x1b9/0x820 [ 178.752362] ? finish_task_switch+0x1d3/0x870 [ 178.756849] ? syscall_return_slowpath+0x5e0/0x5e0 [ 178.761768] ? syscall_return_slowpath+0x31d/0x5e0 [ 178.766689] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 178.771694] ? prepare_exit_to_usermode+0x291/0x3b0 [ 178.776700] ? perf_trace_sys_enter+0xb10/0xb10 [ 178.781359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.786194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.791373] RIP: 0033:0x455ab9 [ 178.794544] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.813751] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 178.821449] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 178.828706] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 178.835975] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 178.843238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 178.850497] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000010 15:48:00 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@hci={0x0, 0x0}, &(0x7f00000001c0)=0x80) recvfrom$packet(r0, &(0x7f0000000080)=""/161, 0xa1, 0x40, &(0x7f0000000200)={0x11, 0x16, r1, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = semget$private(0x0, 0x7, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0xffffffffffffff7f}], 0x1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) [ 178.880724] loop0: AHDI p2 p4 [ 178.897157] Dev loop3: unable to read RDB block 1 [ 178.902136] loop3: AHDI p2 p4 [ 178.905384] loop3: partition table partially beyond EOD, truncated [ 178.922319] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:00 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x208000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r3, 0x100, 0x70bd26, 0x25dfdbfd, {0x2}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xbf}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x8805) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x40000100]}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x3, 0x0, @pic={0x4, 0xfffffffffffffc01, 0x27, 0x6, 0x7, 0x9, 0x101, 0x3c44, 0x32f4, 0x20, 0xaf, 0x7, 0x1, 0x7, 0x7, 0x1}}) [ 178.928760] loop3: p2 start 2020327233 is beyond EOD, truncated [ 178.960966] Dev loop3: unable to read RDB block 1 [ 178.965984] loop3: AHDI p2 p4 [ 178.969224] loop3: partition table partially beyond EOD, truncated [ 178.979039] loop0: AHDI p2 p4 [ 178.987212] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x32, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0x1000, 0x0, 0x3, 0x2, 0xfffffffffffffff9, 0x3f}, 0x20) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0xc0000, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000100)={@loopback, @dev, @dev}, &(0x7f0000000140)=0xc) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000003) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x6cd, 0xe173, 0x8, 0x8b, 0xffffffffffffff01, 0x80000001, 0x9, 0x1, 0x400, 0x85d, 0x5, 0x1}) 15:48:00 executing program 0: syz_read_part_table(0x1000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 179.026938] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f0000001000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80500, 0x0) [ 179.085941] loop0: AHDI p2 p4 [ 179.090932] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x800, 0x0) r1 = userfaultfd(0x80800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000140)={0x10}) 15:48:00 executing program 4 (fault-call:11 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:00 executing program 0: syz_read_part_table(0x700, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:00 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e25}, 0x25b) listen(r0, 0x3f) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfff, 0x10000) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000140)=0x4000000000, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23}, 0x10) r3 = dup2(r0, r0) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000004580)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000004c00), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="100000000000000008000000000000000572d053a9025abc97f9a76079308ce53288d07ae957abebe2e9ed2e48f108490675b5d1f5fac5fd6e5b868bf958b3d23d66c3864bb3ddf2e9f19c70330f2d95800194616e075d803ddc97a603d2beada81e1cbcc4c0ee27dea63bc6e3"], 0x66, 0x20000000}, 0x5}, {{0x0, 0x0, &(0x7f0000009fc0)=[{&(0x7f0000008dc0)="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", 0x1000}], 0x1, &(0x7f000000a000), 0x0, 0x40}, 0x2}], 0x2, 0x40000) set_thread_area(&(0x7f00000000c0)={0x0, 0x20000800, 0xffffffffffffffff, 0x9, 0x1, 0xbc12, 0xf8e, 0xffff, 0x33998863, 0x1}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000040)={0x20, 0x5, 0x3ff}) 15:48:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socketpair(0x13, 0x1, 0x6, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000200)="6f2751ff8bfe097190452f46d6a639aa2f9d7e35c79aedbcb67f676a256cf11f16688c7130797f82") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10000, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x401, 0x2, 0x9, 0x100000001, 0x0, 0x4, 0x40900, 0x2, 0xfff, 0x401, 0x1000, 0x62a41a98, 0x77c5, 0x100000001, 0x2, 0x100a, 0x1ff, 0x6, 0xe225, 0x5, 0xd0d3, 0xdc, 0x7, 0x300000000000000, 0x2e, 0x0, 0x4, 0x0, 0x7, 0x1, 0x4, 0x24000000000000, 0x4, 0x100000001, 0x9e4c, 0x2, 0x0, 0x4, 0x5, @perf_config_ext={0x4, 0x1}, 0x2000, 0x4, 0x8, 0x7, 0x5, 0x49, 0xd3}, r2, 0xb, 0xffffffffffffff9c, 0x1) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_bt_hci(r1, 0x400448cb, &(0x7f0000000240)="1e238ce5339771dd25c2a86e7614e2eeca21ad3fcec5955ed9133e3118db10973704e6ea6682d46648a266d2dabb4e7bf18e23474137957362d5d9deed3f89ea1b38697a0f1f367a57c9b21c9969c1928977253795f8d5362ce500026b338c2fd11e058104c8a26a543ec12ab2c8286889e49783cf78711eb7d57d3767fa1494f41b3f5c379dad279561ecaa8b5aba1ce540b7cc014c8efc871a72a6f890683dac6b72753fae8f1d67d4bec20502398e02ad3b4502db3c1dfdbcd650fae5f0bea12219b2a7d0070e71bf2a526cfa26c9d53f9c3d821082d583c22e7dee64bf5e04ab530369bc11e696657517a47e7cba516a5954541f3ee2ff6f6637212105859d1b67ba9ee2ae4455e47262bbfe496b94f58f93dde09f5f458f0c5f6570b0a6469144eb7ae16cf01349c4e32e67bd036a30ee93c256128a907b6e161236039b9fa3fde008ffe7801b7638a5055081fc78ac840bc6c057d594a73aaa272bc990e9e84f2b97232088d06c8c2f2cb986fdf00f3f182d8190e77584184509d14ee17c7c61553ffadfb0002fa9085e3f7c7888a1e346e378e61e74a10794a32652a7e828393413216038a4d6e294316936d874bbd9676d0c6d57d7a419183350555f3f3f8c1a4e57ae871ed3bfcd3ee0cd0d6f9c1f36c8235fcbdde2edd5a1eadc79d38df4d3694a57e9c404215a3802ab86c31ca6facaa267ae0ec2f18c4dacf64fd5e38ef54b689cf9d88b822aad69249041d9adc5838fe9909846f8764f65b1c127eb6bc9690650c6b0451a0b68d701f6d68d67eb2425100a6f49105ed0ea1e3c6bd4555a84e16d7a1602ace7969555e0bd4805e0c08363905ed9a29e878194a01f0491b7a3389d7d973d15b0be091994b197271df12c81f99c0f9ea50b3c50be01d6f9a59b01e8d98adb56f301574d4070a0c4a28cd56d4286da0e9748e72998b1f21cf2661af23de827bda0fd65b9db1e0e5fcf2de9578d1da5d94ec8bd9808f6793dde301076c29699cfcce15cb9df44d6c25c93bf76665d9c0a26c75375c229aef957d4754af42dc98d782f5b06c2ba8b59f620f747de0336aa19eba03f58f23591e6a959c0cf82cc85f78f863af8fd112990d088859ab5aedb7c0f9d27c6b25a8b55958b9e5a50c2986571752e8601c428eddaecdcd389dec3096f273505a12991d1a8360ca770e460b5dc4da56fa7c429a97ac2c36ce97d3acd089c1af3fc2402a3c26fc7b875d03b5e9dd1ed2895af986f984297e30da49c7b216fb06025f683a2ff5e1d944360f2cc0dc840bbeef06abbfcad8c7955f8f2692904f3ece46d80cda2745689b8bf7f13e7c9e3a24536fde3b2beef87e422d1e4ccc6f5a2c36d39f7f24d7127f9aad405074ebb891836926b5fc1f7ec46afded89d303e365ba62c02567370769507a4686643ccfd640cf5dccfba94bf96345d309f8203efeaf3bf6d17812febb5e6cbdb822279b314cb9dfff216b198739ce5b848e4e67a38892b77e87e10a46d757b1a5dddaa9663d2915478f4577c3d3d983a4f4eef0214f698913831d6a0d7aa39fb0b1baef92147235b7410e41a6a6170ad61d39c7b5335b9751217bc9bf76ba7e7372d2c5ccca9e98633ac0060fe6e478ac34e92151401790275e808472827b00452226586ee8de1a7c810698dde54bec2b62c05ab90444bef9d6928a37b01e088fe7fe5b034e94e41500505b4625b5e06957c6a03a6d7eda11b4f3c87c5f9d390eee65aa73aea8b2b2473470e369750e042580cbc6011db2d6d489a82c79ca2df30ea71afd62048b9d8c4b5f750a39eec508fdc7df080ff5bf6c2f77ce753d45b96585d21fd4ac2ec566e0e4d908e3493991b2a702d52a9ce0f69d847314268c61501c32b50fae6bf375ee56d40789c426ed29fd4445c2965c9c3e98445cab6c7965610a98d6decb8897f10d9d782c4259c4a73a02eb22dccb534df67e7ef59ff339ccb998c7cc689fd98b17249d3e8b7845ef4dfb658fe7f11d107502297d3b800f1d594d93cef53ee51bc9126eb311f2c872707af7f5f89ded4b8d9713e099b0f5c9bac70baeec5b260d51221b5cfe9241972e1d5378d10b018be7a859db9fbd782a5ffb23f4685e3b232492b6274f4009e46809dbd8c8a8941088a6e29645ea88314fbadcacdd7dafac2f07aba06cce423d7551d56edeb2d2e4d6eb6d0b686b6333221b3ee64b11ae64adc9fb837a1218cfb208e3741b43ac89608f865943ce154a443a6bfbd098f07551ff60f1a06f653381fd17dfc3c32a7d57a74e5e002863ad003e03939f9205d827fb9a3fb554a9945fb9c4cdb033ab96bc5c0a25e474715fe876ccbb220e366cc5203cca8a1e41a160323b7f4ae080e3d1fe7c5ee45942ff557b147ac7673694d448ebbd12207eff3e98a71ce2785c4f2943c5fe73c3bdb80494fd3dbd399c3ef223be2eb6b6eacd7efe2292f01dd6efccd7ec99d061651753f8abfbdc0bdb078bde8cc287d4a6a97b9002c41bc6eecfa5b71dc66c6176524340d7e65559bf2cfe6de2ceb1b8aad2fa440f8b96b41029d3ef15b42044bc9d30c3f6b973df133e2afc915d64c022037d8f8a18f7f01566d0fd5724926877b33350b1a63652882d6cda04945d694ee11045582ed2a522a891dbc99ef4af067030e3f1a36d401e79e261d13d2309263b7c084e0952fbb18da69d38efe91aea7ba43465e3931724807fc53f435f86272852bd91599c189bcaefe956b93bda3a84567fe09772b0ced7b7d9783085c1834033ab4daad763a5dee930e4482677817988157762a58a7959ec91600848486af7caffc7da09008782ad71294e21f073a45636ca9b32d998fe046a1678021650b302b97893ecf92c4019b54bb85286f1fff71f6ef7f2f0d2a7e2047a2fc934e3f6cd4b46c08432a53cc4124e8c7fb77265a9f5e2ebe6bcb1615bef4c044671dbeaaa943cc7c4755afad674d8310aecfa820ea183f277332349f99714a6749c4cdfcd1f298a4eca7300c44f604a7ed5aa9eabecf225ac725141a04d7c265d36ec8bd20642d0563024e5655f6d4998864c4846bafe891af1605f47a220a2f201ea9c8497b871374fa09510062e731174c07b52ceb971f29c8dedba50db0718a11dbc816e4fa46a9d2e268f06378858e96e837e474edd3cdd3bddda7370a9acd01be1335ce327a6411135a5e6c7447cc9a8537e87aae9d83f7d5cb2da3ba35c7391e3d691b6057bb3bd6afc80b8fac15505b62e1724400b238e0088f5626de8c17630989e2c51705f400beba802fde376ece88bca79040a10619760723105336a74e153dc98e2f9bdac7e4938891c75bb892fe3568008c39f8ce6d963475005b196661201659fb955f2c901075d8117eafe902094f57ed40df7616eb71e21f329b894d2ab6888e9bcac2520c5f1ac6b19c42d4fc8bfc6bf696e5fe206acc219ca99c9d7d0d3e6893068315caed6c31b69c52ded463deed3bf6d1d6f149a7bec6065e0c0aaed8c2715352fc973efcfb62f214e907301acf47917108850335a918f24ea8bbc40a1c8fe5ae27b035369c4874bb0159930764ecad180fae53a26caa3e20b010fe146f263fa5d360993778d96f7e853b72928c64a9b754464c13ecc449549616bc1fba3a10277417d4d98e56a4b0e461000c1dbe9a92cad5bb05b365e6eb7e85394720481a30f0899b062f5b70edb281e67cbcc92aba0d85fa08b22d66e8bd95bfa6d01ffdf969c252b99d6f7b18d75810968909c0dd4dd7b2716c5fbd1bbeb776589b1793abb73bd439de9758f629ab5875f459b2e08147cca481e37047eb18c80844c1a6444d4ba37b7bf044c987b5bd34b29bc8a51c871554b5f6849823d16c08cb956b0316cdf6f195186ff01ddb2d08a0e7856e56d359a4d0692aaf354e35367ed296e7c6fe5a9dbe0edc77ba58a356ba3395d92849bb6456baf13d057ce1a77c5ff5fe18719685bab9b1f34c9ba81d3e38051b4ae0100ac18ab437956936b93c5f4711a8b7bfd2a283ad80380a038fed8ef7edceab216fa68f15b7e5b2947a712ed2f5f1364a02d14dea1dd3f933d6cb181de55d9443d1cd6879ae56cde23e38f8a0d9831915a71e0388c9ca30dabf5909ff0689bfe83046b5d285a2ba1d279b7d097f98cd0691a8db2e45d86547b6f9a1310ab2db4b286f86e56e33f23a8810ce21967309d894ff3a766e7d531955413c8f13da81c0a4d69557a6ea9d0fb8ca11c758b6925f26d264df87a272295a48ab0c82ef87b0152331a2bc1ad364bba46aaad87ab6ee20556cabffabc04ba02c15b7940730cb7c3967aa79f4c7970ce9c0b6aaa415b5ec1bf20cd011695bcee37230ccef6219554bc018befefa746a8e928a01b288dd0c6db39f9e3fc6840600ced04f97aced68ea94d2563cfd15201fd23c1e9d04e1bdb71a4b161079baf9671e47e2a344d9b7ac0f6d9b2ed10da3fd0bbdf046f7cbbcaa3de7ffeac9606ea3e1aff520cf2c026c67571ee0865094fa6930741d5e987787ea66b7e6a2c73ae63610d35453d2b9f78fc6acca11ad68fe14d122934ee17a83e07397f01a6ef6523b892f1c6d128ac1652334043dfae9753f35f8d52c3b5e1351ae2efefb3498c28aef152f6903cb8590809d3e18cac472dc57c3bdc3c18ead7c27cb6873485815564a2c1f475a7004c6b4961774c98f61d25a05dfabac466c7d31312fb2fb49a7b166d331b96a6be2a08b2fa27e7226644f754699e553ae6ebab135992b0314521400e1d50c2dad759762d4ed74fc03d897b6974df249ab76c60b8caee053cf54b4ab656858693778a9575193f12036585c1c5f5339c993705e03b937d6ef4bdb022608d157018d475e747c6920829ccdeaf258ade0a1cf8519e89029e4163d22f256ff1f3fcd3e079ca24b697b1c3868b92b010a9e55a307e1ad99a5fee778801cfa2fb7d71fafe3fd8eca65d259a7eef2150c493215308e4a2eee65defd53f27545bfb7bd5d8114e6d750e91b23cf16cb0987e236fbaca6b4d6580385cfc465a4e70a9f08eb311492ea5bbda3fc592637edbe36f7db59aa7a3531ea30c90acbf0e53486a04f82dcc3231ccf3e6bc55a6f0a1d6591df3dcfc2272da2cbd8bbd170d165ce49fb77e01077cc08fde7a77ffced7b98c32c821a21970e9538142818902bbec7196e82132140005445ec3c900a5f4f7b1e45842a847a69baeec003a989290cc26d8e1554881c01b4ab417dde6604d990ae636f40e6fdb442ed26836b9e3a89049a488b64586f248d3e0536105f11f40301fc845952b3b2c423748357b09bce46e35602b3757ddc6bb3a1e5833e0c41268393c9eccbfc7894c540fd889ee836db76348198e6680e75b573f7bd22e9621d4f35e46c7a9dbdf2b0560a05269f5edab5f0f23c6d60a169b0eeced937c67b5881836f11872ada762c994e94b0670a2c49829dbfceae396ee41a3e4a01e8bb61c2ff63d48af2221703d62d504a843a86695d65cd4f5f66456d904b9828348e288fd8a8f307dce0405155fcfeca290dc2f2333049ceb7ae825ec776fb73950b697460daff45536fb2508e93eef6de9008e5892724b5b41ce72d1525521fd0c3f2151cfcd006bdb52db8bf9392de47d9e5bd5cd907a3bbea283ff1ff1a2135887b4d45bf526fe41d05e10e59eabbc4794d6c39742eb1a347a4e55acde0740fef081077c661b72eb4b25aff7de7aa46dd982810db286048669816620ee77bf695167d45ba9a817692f28bf395ea142108a2ea8e3c800ec507380fe9bfc33027a9fd3058f7d3e906069f51296eead3677d527730676d9f5290adcf") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 179.204292] Dev loop0: unable to read RDB block 3 [ 179.209354] loop0: AHDI p2 p4 [ 179.212591] loop0: partition table partially beyond EOD, truncated [ 179.219720] Dev loop3: unable to read RDB block 1 [ 179.224709] loop3: AHDI p2 p4 [ 179.227949] loop3: partition table partially beyond EOD, truncated [ 179.239975] loop3: p2 start 2020327233 is beyond EOD, truncated [ 179.253898] loop0: p2 start 2020327233 is beyond EOD, truncated [ 179.269628] FAULT_INJECTION: forcing a failure. [ 179.269628] name failslab, interval 1, probability 0, space 0, times 0 [ 179.281077] CPU: 0 PID: 12571 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 179.289510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.298858] Call Trace: [ 179.301446] dump_stack+0x1c9/0x2b4 [ 179.305083] ? dump_stack_print_info.cold.2+0x52/0x52 [ 179.310283] ? perf_trace_lock+0xde/0x920 [ 179.314425] should_fail.cold.4+0xa/0x11 [ 179.318474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 179.323568] ? save_stack+0xa9/0xd0 [ 179.327183] ? save_stack+0x43/0xd0 [ 179.330798] ? kasan_kmalloc+0xc4/0xe0 [ 179.334672] ? kmem_cache_alloc_trace+0x152/0x780 [ 179.339676] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 179.344852] ? __list_lru_init+0x4d6/0x840 [ 179.349078] ? alloc_super+0x976/0xb10 [ 179.352955] ? vfs_get_super+0x6e/0x270 [ 179.356943] ? proc_get_tree+0x88/0xb0 [ 179.360820] ? do_mount+0x6c1/0x1fb0 [ 179.364517] ? ksys_mount+0x12d/0x140 [ 179.368308] ? __x64_sys_mount+0xbe/0x150 [ 179.372443] ? do_syscall_64+0x1b9/0x820 [ 179.376494] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.381863] ? __sched_text_start+0x8/0x8 [ 179.386007] ? lock_acquire+0x1e4/0x540 [ 179.389971] ? fs_reclaim_acquire+0x20/0x20 [ 179.394281] ? lock_downgrade+0x8f0/0x8f0 [ 179.398422] ? __x64_sys_mount+0xbe/0x150 [ 179.402559] ? check_same_owner+0x340/0x340 [ 179.406881] ? rcu_note_context_switch+0x730/0x730 [ 179.411800] __should_failslab+0x124/0x180 [ 179.416033] should_failslab+0x9/0x14 [ 179.419824] kmem_cache_alloc_trace+0x2cb/0x780 [ 179.424503] ? kasan_kmalloc+0xc4/0xe0 [ 179.428382] __memcg_init_list_lru_node+0x185/0x2d0 [ 179.433389] ? kvfree_rcu+0x20/0x20 [ 179.437003] ? __kmalloc_node+0x47/0x70 [ 179.440968] __list_lru_init+0x4d6/0x840 [ 179.445022] ? list_lru_destroy+0x500/0x500 [ 179.449353] ? prealloc_shrinker+0x213/0x480 [ 179.453750] ? __init_waitqueue_head+0x9e/0x150 [ 179.458404] ? inactive_list_is_low+0x850/0x850 [ 179.463063] ? __lockdep_init_map+0x105/0x590 [ 179.467544] alloc_super+0x976/0xb10 [ 179.471254] ? destroy_unused_super.part.11+0x110/0x110 [ 179.476605] ? lock_downgrade+0x8f0/0x8f0 [ 179.480742] ? kasan_check_read+0x11/0x20 [ 179.484878] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 179.489468] ? kasan_check_write+0x14/0x20 [ 179.493688] ? do_raw_spin_lock+0xc1/0x200 [ 179.497916] ? ns_test_super+0x50/0x50 [ 179.501791] sget_fc+0x269/0x950 [ 179.505152] ? compare_single+0x10/0x10 [ 179.509116] ? alloc_super+0xb10/0xb10 [ 179.512990] ? kasan_kmalloc+0xc4/0xe0 [ 179.516869] ? __kmalloc_track_caller+0x311/0x760 [ 179.521703] ? proc_root_lookup+0x60/0x60 [ 179.525856] vfs_get_super+0x6e/0x270 [ 179.529646] proc_get_tree+0x88/0xb0 [ 179.533352] vfs_get_tree+0x1cb/0x5c0 [ 179.537141] do_mount+0x6c1/0x1fb0 [ 179.540668] ? check_same_owner+0x340/0x340 [ 179.544977] ? lock_release+0xa30/0xa30 [ 179.548949] ? copy_mount_string+0x40/0x40 [ 179.553179] ? kasan_kmalloc+0xc4/0xe0 [ 179.557060] ? kmem_cache_alloc_trace+0x318/0x780 [ 179.561920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 179.567466] ? _copy_from_user+0xdf/0x150 [ 179.571621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.577145] ? copy_mount_options+0x285/0x380 [ 179.581631] ksys_mount+0x12d/0x140 [ 179.585247] __x64_sys_mount+0xbe/0x150 [ 179.589214] do_syscall_64+0x1b9/0x820 [ 179.593092] ? finish_task_switch+0x1d3/0x870 [ 179.597577] ? syscall_return_slowpath+0x5e0/0x5e0 [ 179.602496] ? syscall_return_slowpath+0x31d/0x5e0 [ 179.607413] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 179.612417] ? prepare_exit_to_usermode+0x291/0x3b0 [ 179.617420] ? perf_trace_sys_enter+0xb10/0xb10 [ 179.622076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 179.626908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.632084] RIP: 0033:0x455ab9 [ 179.635285] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:48:00 executing program 2: ioctl$BLKPG(0xffffffffffffffff, 0x40140921, &(0x7f0000000040)={0x100, 0xffff, 0x13f, &(0x7f00000000c0)="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"}) 15:48:00 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff000000000000000000"], 0x5e) 15:48:00 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x2, 0x398, [0x20000600, 0x0, 0x0, 0x20000938, 0x20000968], 0x0, &(0x7f0000000240), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x13, 0x3, 0xb, 'veth1_to_bond\x00', 'team0\x00', 'ip6tnl0\x00', 'team_slave_0\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0xff, 0xff, 0xff], 0x120, 0x158, 0x188, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x3, 0xa8}}}, @stp={'stp\x00', 0x48, {{0x9, {0x3, 0x200, 0x2665f0b2, @random="9ef82fa73460", [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], 0xe71e, 0x10001, 0x7, 0x0, @link_local={0x1, 0x80, 0xc2}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x4e21, 0x4e22, 0x400, 0xdc0, 0xff, 0x0, 0x800, 0x0, 0x1, 0x9}, 0x0, 0x400}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x0, 0x1c, 0xf6, 'team_slave_0\x00', 'eql\x00', 'veth0\x00', 'team0\x00', @random="e06bd369d6bb", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x110, 0x148, 0x180, [@arp={'arp\x00', 0x38, {{0x323, 0xcbbd, 0x4, @loopback=0x7f000001, 0xffffffff, @rand_addr=0xffffffffffffff33, 0xff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x40, 0x24}}}, @quota={'quota\x00', 0x18, {{0x1, 0x0, 0x5, 0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0x10}}}]}, @snat={'snat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x10}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x410) 15:48:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) ptrace$getenv(0x4201, r0, 0x4, &(0x7f0000000140)) [ 179.654484] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 179.662202] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 179.669458] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 179.676717] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 179.683971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 179.691229] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000011 15:48:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r1, r2) 15:48:00 executing program 4 (fault-call:11 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x100, 0xff1f) sendto$inet6(r0, &(0x7f00000017c0)="050400000700000000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2dbd94c3b50035060f118d0000f55dc62600009b000000faffffff00000000aeb46245004bae1356642490a7b5fc88046a9cc49322e664f65bfc370ad3", 0x78, 0x0, &(0x7f0000000080)={0xa, 0x200800800, 0x20000000005, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 15:48:01 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x1, 0x40000000, r1, &(0x7f0000000300)="2e2f66692e65318c00") 15:48:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x2, 0x20) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="db18c0ba871ff5ce1df67f3e85a963cea8d9e734dfa84f0cf975c321d4d2269e09e12598b42c23b5f5e65790d0e1333b093f5d9839cf8ab5c7021cf4560c3078da67607ca0e85fec87044221eb", 0x4d) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000040)=@dstopts={0x0, 0x2, [], [@enc_lim={0x4, 0x1}, @hao={0xc9, 0x10}]}, 0x20) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000003b40)}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000140)="3ed2dbb8d0008ed036d02e7c00660f013966b91406000066b89be4000066ba000000000f300fc72c0f0151f266b99a0a00000f32f0822a006766c7442400000000006766c7442402030000006766c744240600000000670f011424", 0x5b}], 0x1, 0x0, &(0x7f00000002c0), 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) ioctl(r4, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) pwritev(r3, &(0x7f0000000880)=[{&(0x7f00000002c0)="c54a65f0d2c27be3b242ed7868c8a19518ca85e76bb510887fbb237aa571701eedb8c230d924907e849f12810865c69e188549a405712b07e6487beb8a439a7e3ca2f6f43f542e3a48072c855e44bf7cf2896f74556b1e2e130d0e94518c79ffab315663b5175e3bf26df093bdb63fb6d2e08e4d280b4b89804af76501602a7ca042fc9bacf03565598f7fc817e0fa4f358977e6dd9e2d02534453ff0e51bdcdac986a8d076fbea33184190b0b23eef5bd4f0ceb08", 0xb5}, {&(0x7f00000003c0)="7e4fbd2a0b69127ed34bb47283c3a54de485f0a9349cc500f181836858aaddb15589f737541ab14cf70c4d4c23127cea24d097d75dc4a4191540b089a4677b463f844916eec21d84dde5993e87bd49dab1d257ff376faa8f38c348d29c69252ed3880b79a679c469a328b418597a3f5cbacd44b3a3e29e2978b3990fd6679f4506b8d1851645802938880ca06cacef79bfc236565efbb94b5bb08d5b0f31af0c36509227d81a7e17fdcbe8e566abd8153b6d78130883d018e1bcff06e58dc533a7f6b3431afddd181f9d51503232be08a5de471044e4f0571f0af9df6b5bb88d1c41134311921239645317415542c76b1bb2", 0xf2}, {&(0x7f0000000580)="4a0d6cb6ac7c78f1691d397da57b2494bfdfd845566ac578ab01c338cc970ba3b26c53e6850ae7fe9152f74f251078a28c4136230dcf38bfc8cf7bc0dc6a646001ca7183c27e0792d6070d4cdbfaa2c2d626794156ebd3fd64bd2736ce5e791734e4415b0a874867e661a57dba5a2263f9ad33cc630aeae7dc7e8ebee2ffacc16e8dd05539855cf02198d8d7958a57f97aa6fe938085e411e93dc71be5ef17be0d1b87a1159a42ef4d0386b80d9a8f6ffdb0476f11a5157e2dd1ad92be793e0b90a1bc1330c750d0501cbc6094f790f3b97af3ee069a7f30df0a1d43b84709354b80c37c30a5e7f656a35ec6ee", 0xed}, {&(0x7f0000000680)="329b877e6f93c100ee1ec089f2d6246d99a155518f2ceec28b97c160f67f28c0fb3fd6866b62ded2dca6817c7570126bb852761f8e1737f813a0b64d4cb9168e71a41296cf87c70682ab81885ca8b49041b96c3b865996471f9d", 0x5a}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000000700)="9ba5141920816aabb22a5e84c9718f867f2b44ff761aaefab5d3295f17e8efeac936874e9919618a99e30ccf3dc2fc7d6b17b6f3eaa452723d7e8193fb709a20701f08bd2f079a4a9396a4490b45114a49eb7ea04e31af19dbeafe12b192f4af83d821b595bdeaf4", 0x68}, {&(0x7f0000000780)="bd82c8b05d7e1b38cff562ab1d431079c6d96875618292de3280aa7d31af4fa1fe91e4693b81e5d258bc62ed29d4931b3a521b9ccfd61f340f345d32862a121b59dd327e911304df168638dffed60268b2f9a6fb360f12a513a6c66d9853a05f3ac3c25ffedb3190c588024169b26bd41892aecdde6f14c4bb27257f685309ff67f62c67f5714d3511267246916cc7e0fe44f87c9da0bbfc0e928c099de3d4139a4438b6316d7c2c7078932fcaee6d2f1d505af7eb4526a98b854608066a2e48081ed9ec4e49f91b", 0xc8}], 0x7, 0x0) [ 179.759266] Dev loop0: unable to read RDB block 3 [ 179.764313] loop0: AHDI p2 p4 [ 179.767549] loop0: partition table partially beyond EOD, truncated [ 179.778850] Dev loop3: unable to read RDB block 1 [ 179.783819] loop3: AHDI p2 p4 [ 179.787050] loop3: partition table partially beyond EOD, truncated [ 179.798471] loop0: p2 start 2020327233 is beyond EOD, truncated [ 179.813114] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x600, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), 0x4) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 15:48:01 executing program 0: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 179.873427] Dev loop3: unable to read RDB block 1 [ 179.878402] loop3: AHDI p2 p4 [ 179.881638] loop3: partition table partially beyond EOD, truncated [ 179.904667] FAT-fs (loop6): bogus number of reserved sectors [ 179.907752] FAULT_INJECTION: forcing a failure. [ 179.907752] name failslab, interval 1, probability 0, space 0, times 0 [ 179.910680] FAT-fs (loop6): Can't find a valid FAT filesystem [ 179.921811] CPU: 0 PID: 12609 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 179.921825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.945446] Call Trace: [ 179.948049] dump_stack+0x1c9/0x2b4 [ 179.951692] ? dump_stack_print_info.cold.2+0x52/0x52 [ 179.956224] loop3: p2 start 2020327233 is beyond EOD, truncated [ 179.956890] ? __kernel_text_address+0xd/0x40 [ 179.956909] ? unwind_get_return_address+0x61/0xa0 15:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x200000) r1 = memfd_create(&(0x7f0000000180)='wlan1\b\x00', 0x3) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYBLOB="02000000509e64b5d45c6d527223a93ca5fd14492c6dc14ebab55231ea66e6690a451830609e188c07c1f07e9dad870999e6857d794b247886b75ce4e9cf8167dd5ae9a7cbafcb261349bb88e755a4b1a3f2f7af149c22393a4a2c3c0acad0191f018f9a946346e05205c45b1c744e8055716d8b56f6bd5322c438b1d188b52ccda29d092a0b413a853e296382c4bad474321a1bacb5a94cb0d7e3f996e11202478665e586cbbcbe3c40a6c6f564561920b023a49638d53caeddbeeb5650762731ac30db1b74544967df16e5a7625d38801e1e2345e0b9a13bcc50948882c2f5ea6fe71c322843504295def7c1ad3817aee52bcc1c9f4dad60b7c2a68fcfd9452aff4e9ce621107701ded33914d41ece775fc338f96bcf80f2bade95481144f1c66fcfab81004dad51c8bb07b3179a165cedd926f3e6507460bc03a607a53facf21214fe210aef6f5700d1ac6a4ef4e4348c0e83fa098aea5cfe488b268b3ce2653a471ea28521b35db302703a86f6420ddd080d3da5c61771534fb514e8af2a027270909d7207eeff152f34bf51665ef16d5577c14edc9dae97544515453a07e5e0c8bf24ffb1c76fd5c7177996b327a41e67054fcb8f7aae6866a28ac76db00855ad977c5086eec8f57fd303148993166be1bcb2b7db35156b7b0189777e999768ce8e671fb239ad67f4192621d26d4a39c1447871d1b013919ee07eac13f2b690f588d494dc89d1c5f137b88c6563fb944bc76074bcd2470c770253c3213667f0e378c7834f0a45db71733775712b66ae296ceee2e98b407862ff5e238d5f14c4bc9bfe063a6a391216ec4a90e4238c9bc05495b48128649c0fa00f3dd209195e7461145fbe5e47c951baafcfc8e2e07a83748c64d3dc68b0e4edd720f00088260d69ac5631cdd861d2ec629cf2481187efeadcc1ea8da55bf9190341b843b9db1420278d74f0e76a1f3c9bb9f7def9dc90dd5c4639eb119c11d2e249afd22833b8fb6995ace27f72c48217d947c22276e1048d39a4a9b300a6515cb9405636b3740bc7f4f260743fcefec6434bf3cbb2837a44116c621091008afb39241af4b01e470f342f0ef1b9589444d5c634a3da348bc1aad08a6690b148882eb496102c70673bb4bd23b15ef11e64b0fca2558514295980248ad79670faf6fa6a5c9b4ecb5b9531322b201f7024ac973a3b443f90d93a4bb49b21fcb8a6bc24d50e22da38a776a62b820737d523742d0c4a69dc966ecde3dfb019265f9accf3c18f51af250574da1125a424b7980472364cee614d014ffdca918adc08d992a248e45a258610f5cb31428e77076367f825ecd0c75e0e29b178d0ef2ff546c8d79c5c1840fb33627dfa969f140d4b58d98cbdb03141f6a02fad1d36cf28d86bc6034a3492077f769528a3bee33566a2c31732c48b2b3659a491a1f8c884e443004a30d49472a87af5d8db38d7a8da21ae61c8385bb56d139faede77575ce25bb285cf8a5171b1dc4899997fe663b55c11c1ca01f2e8221f16ead38f2d5f7a95e349940a23147b480bbad2f2cbaf961bc968b5955c9243cc67e246bdbeffefd1c08af1cb3ac8656d17d58561133370332188d1a26ea1981b3279728e7e3a29e79664733a4c555ef11dee258c8b9a970f3d1f283d7a1c14e75d65529d072316bc91d14a10abfc4b078a6704a4a0c8526977c6d4801a7a1cc476f495de9e1717a13a013f4a4529736ee810c09a40e9a41690b97dd69cb48897355a62478401e56b49da14e4bd9aee4dd2fd857f08bc8b745d0e15d2247ce3416123cdfeb8fc39a75a07d00dd9ab52c3ce94780b18051f9e3bde440d6571ceefb4e1ea7849aa8b24d0818afcf1571f03bf822e503bda74bca274a7456b55ffea80f14d992637c06e9d67f77e76fdaf1711775e125e2c25bee0d715468e9e588cb46ecb635356aad03fe35c65b4a3a277fc75d3ff155244c497f42dcb00c58a0f3ea13b16125cbb9fe7b799fd12d6dd4dd9562bd1809c9ed9e338baf94e75aedf16a8c5bbfc859091799aba7608d6b1461a8985710e2bd0aef7cc168aa0853797bc2589005c4784773f85e9aeb8c2f1c3f0f8fccdb3c28c45ae856b1ce1b3f6564d9929e6fadbb597d71f0b2dfca22962a95afe87fe1c0657a295c87631bfeaeb1764886187e14f2dbc42683b583472af72a3b145061b6431cd47d8986ce8d5043b9f84a8005ecdf63a97f7850998d44ce94b80ff86940364b08e31bb3ee7f74fb0dcb8fd7814463abfeca93a4debcc941324af30cf8dd98385cf2c83a9ac5754a9b27027974270260911abaab936184e6590a6a20c2d775832081bb71b21b74226daed2b5cf8adf64a677f7f3cb1a2d2a9d721217ac8b8cc60b1b98be635f5f437ade65830fb3181237743dd0ecabeba99e99a916b93a05af92f2f16094ba3182860464471fdfc9138e898505306f24e6c42869d34cd7aa6ff1028585051dd233c63877a07dca922a922bfb87240a513447325b48091eaf3b7005d8549108986c7fbf806ab14d89729eda674737cc674531c082929da4bc6f391c283b674f9e8a408824f5c1dbd9f330c921dc1df56be14fb39c591a4745eb0b86e943a912f0aa64c9205016b004c3ec572ee562c34ca4c355bc0ba0388a449d5becdb7302c2db7e023672d0834348a56dc052efc7025e821be882cb6e0ab044e1e101c8726cc2f4f08ef4d985248d9bc050d0f3a2476c4542b2906d0b4506af1adebd53c9c22c3f67148593a365634582f3088954d076c96c0448556ba125939bed17b66567229654deee71564e03e5694e3baabc39f8efc605c96b5c2948666b49916de1531f0a85899f9ef6c615d980e3b2e2d9eb77a67340817a6b68c5b631b0e2e2020bcbc0a2e22391123648d7177665cfb56a40f4d6d07327bc3d064407846f9aa148399dd1d6570ae518a4cdc407b45a737e9e1a0d63612e9636b249e2874d1b836a4573ee233a0473c4c7dbbe56a3663f4d865a5d4902207c3a2e1073ca4ad40184c2ed496e3a2093145e7b210170229e09fd169262983923a017b62ee49ed0400acc46ccabee6faad1b42fbd328a9f1d31018b04e8e8450fd02d60b7743f40789d5527d52a43d4c0b743d132cfad6a1d0af47732740d532bdbc2560dbd9dddfe9f6badcbd5786f57cc32304e4770894b5bb02d0085a1c5e6e96e85a0eb00571ede97a7c27bd5544ac0cfc05e5f14ab8b0be0811cad261b2bccd121723f4712422d66460c064044828da049e4129d8ecdbb9a6569b9ab6da6c1d94bd8880b2ff147e045691df052e0cfbb8fd90cb4cecf980c5207a5132ea54519b743490cc23cb744c691ade13bb0b0c8de4579ab477cc7b177df363c58b3bf34cdb412f7abfeabbd45eab7fa5fb9fec8f877caf2074b46c6936fec0bdedd024d6a936c68cfb1185a854b9824741326d0e0e80b02943c215a7fe325b635b585ed3b18f0eb9d8fb7a5caab64ff9849c3bc849face7029d1d60aae3d0ca8c5f15549fce1e32b02ce88906ada55490a67471202660ad54d05d2187864ea0e67a08111411501ff2e61e50b0abf55f26ea64852ee671dea2ae8b23ea5a52e8e0a9517feaaf0ba2de7db74b57959230c9708f0254247ac8abe2c8e6c24a445bbbe5a8114c270bd902f5e041ff44583af1abaaa7328a1432c759fa37a65b32894c7c392626d96a7aa621de9281db974409f4bb2eaa9b063be6bdb45dc81723185c9486770a9f385bbd4338885469f2d74e8f0c865c3419d2bd063fa094265ddfa69cb032c07ce765a34f84e49869b6e6f0e781c0116247b6dc3e5f3257e8acb6babac560c368251695fe719538a31d2a39fa7d519b91bc671adb1601f313bd857bd267e4304eda80e8976ffaba191e016d90ad8075913e30c0ca2a0f1b6945ee7830ce2aa014b530ed5f9ca3fe2364be4bb83e37ce56abef2d23e7996599944a5ef717d53ca315b2474ff3b2f9049e27b997fd22b2aa4c65cfe9723e7dcba2f55c9542e51011b248c74b4e66a2a7c2b3b37817d86f939785146eb60d5274e61e11db1a30481d9a6b5195f191fa223096c41d4c097485ee15f5b2126faf2f01a26fc6c5eca0e9e2187e04140a69ce5767aada44c06b2d3cc71968edadf21e05607e0058486ee44f49d3f4f68509a216b0c07648401bdd31b6354b5bd6fc4d7ce58c360139136a7f19f3838325d405d9d8677b73a3b63d136c835dafe9646edf65dde93f4b15be996855c6986bfcab0e1d4f6a9b605c0b40e1dc3f5df35a9624fcee6fee1823d209fde1e914af4aa39dc9f19f11af02ab17497d1eaa1c8713e99a73c1956940cf32397ee4d9b234ca993c8412b39c74d98a285f54b0ae96d9df1a86ceec8ce0c0dd0c92b86288dc231033abc116630b70bf1729247cc5fcf148a93dbb892bf9bfa39a7b32bf66b957c41cf886503916b9ec3d09dcc9dbec5d0b1130158d26a88038cc83bcfd6a05416fcb22fed92a111bb29dfb46eae654be2a134d52fb80f776f64fbd09badce24a48f70c28b78ad273170693de3cace04c2b632d099c7f197647d7d803ddedb2838186da4764abd4199655c7a7e14b3cf72e267cfdf28e42ee98c0bfcbe6045367461df4ea7f9b8f3f81466e95672c924a8aa4a9ffad6bed4360f4315123f65d117d15d460200f8a7b98d63c411b7c87f75a5874c70fe51727c1bd47eeb3e2bfa44e1394e123310b0d265d1494f6ccc5f250150efbf6f3eb4f5a72bfbf5f7ab7b4db4cab245f622e2ef19dc6bcb77de22211987469fbc687c0b1ac66b5c86ae951bf94616bf3577295aed0be62cc25005d921314106b9cec3c7c238d0d8fb2e08a74c4a92d483fc0f4e5f8a605eb7b35a846bc6065d3e94bd36479e949ad9d9e1771dd8b553b5b149f0c1aae63171d41c8586ad22668ff986cee68ac956026cf10d2ff70790310f5078c4d89fa738d1cb435f14da0240595c6221459eba25b19945ed8f0c1be5dbb7fa5b2399d69d82258c7b42e4d22ee7fce79654b552a60dea90b4b1af23fb9391ef9963f9d282043ca07095be5a93369f9859c69cf76ef7251dfc1c3f87ac6222a94550af7d828518f1a2c0cd42c38ef94658c13bd00e377d40f9f8faa6c52ff3c3126b20da2ba00dcb1c9ac994c7344282cd376eb5c02218fec133786190e71af0a2ebb10c24f8ec2fc2355f6d54426b4df2db5982500ef998a1625d7acd0667654cb883dac269ccf94fb8395ba38f0adf178a1088ec7ae55ebe28d86d8df69faea8d9e560f9a8ee6b0af991481251ac829774d6dc9d06505e550f1326f8fb974a9f84566715c83da2213150d9fbba13dc4100a876478de7c7f68e016da352148642d5b34d1f70943a79c2bec42a5d4b1bf62bbf47a5c227b5fd3ecd5c7f56196c51d3377f21abd0a1c3844b761493f80f6d1aa0d7aeab3c540e140b0918d5cf04f5d445b0aa3e6a0884cbfc686bda4baeb4410e0fc3b8f97ad0f067c6fab6870dad4217ad9933df278a98f3d06499660206277e603ffcb8df28639dc98c6eeed0e69249257e3f97bd860da476b2036335c421d7f0371f3cce691148937d0415d01f3b2bc54faf34fbe99122ccb982fc0f9148ad7b853eb680c402fe307d867e24bc835688670e9bffe504c894d60901ba7513356c0f8fc4e7b121b9c7c03cab998e7ea1982ca2df718f9615ccf4bcc35a826f5c52951d6f89edb406d3d60a087267a15e5f29a211538efdec400160885b24d6708d2601e7b2132f157476734d0cc6dd5c301bc147ad621fa45d550524fff61a2a3aec12b90099ca157d86640bbde70dc2d8a879"]) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002ac0)={@empty, @multicast1, 0x0}, &(0x7f0000002b00)=0xc) sendto$packet(r1, &(0x7f0000002a40)="d3d30692165aa31e694daddefffe79d2619ba90d905aa8cfaacef32ea4c35c7eb1b76423aff5fd87bd107b22f09af82ebf636e8dbd07f0b2ecc25f0b26c129442e", 0x41, 0x4008084, &(0x7f0000002b40)={0x11, 0x17, r2, 0x1, 0x7f, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/cuse\x00', 0x4000, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x210}, 0xc, &(0x7f00000002c0)={&(0x7f0000001580)={0x13e8, 0x7, 0xa, 0x310, 0x70bd2c, 0x25dfdbff, {0xe, 0x0, 0x3}, [@nested={0x1318, 0x4a, [@typed={0x4, 0x71}, @typed={0x8, 0x49, @str='\x00'}, @typed={0x1004, 0x8a, @binary="ac450f7ab222d81b9309d31b8e96c564c0084c5b2b3817aa7f0d5d325e65587bf0faa4a626205a65fcbf861d118e0d0a2b8a9e75e701f2a7263b81d4ec11e3d35c220f1306491ebb6217bf42270fa963e0ea20fd77294bda0f01cf7c666b7a36a10f31350a376936146df2aca57828c522f5e5819cbaf9366c1f9dbd76459d59ed4fc4844d813f022ab5da31e9a3103899414dbd908309669041e52b6b56bb9e76fb7ac6fee1aedbf77ffe195755113f8f3fccd19195bd6eb99e42b38a1042ebc663eff199e2b6698b25861825b0d0825d05f71b06d7a8aba1d1ab3d80f0d606cf30fc1bdc3334f687ace15fd62e002b248361ea958362116ecae1cff6fc4ec2aa85f8b1a808a56ddbf47ac6e6b49b8163af4c37f91262d5d4723236b85723345290eedfa550b656423d936ad7d5185cdf25bfc57d16587aa2cb299765a50c121ffba9daa0ac50a1db222512f6b9cb65cf6bb358c081cf5d72e3dcc141578d30e204a7a354009059760ee7d444fb4184385b84456b7747f9fafc1f14656d386571bc83632335e79b15deaf34d2423a591c48d233e09f175d71b4a38e38bd7a1b400ca8ee1cf0adac77e3cfe317ab581b27d21f51368b08b0c3a9932d2fcbcc858c9b06a92ec2b17fb667006258e8664810c65a091cd3cfc9228bbe502da337358e1aed04dddf80229a3d3a9454cc534b3ec17a90aa4696797ade447246b8712401ca56b00341154b57e38695918caa4661c8e75b4667c329306fceb482d519910b63144c31f976de72fde719f4e9574f3b9a2771695d6e5ab3d61759ff27aeed0988ab3364d68ca88a81595feb71c8845d8e8d03e6daa91d910915094adeb577abdee6657a999d636645fe6a5806bb4d382e60d2dc6baa1067d341453a9d77327edc01aa65c6dc44b9811930a3727764ef0f326a6515dc0dd796b39b45b515967b2c5bd97dff5b797531f7ca9de1205b05610a201867cabcad475f364e92e2f92b58082a89a0c11d1db65538a55790ef7b711da26427f81e9f542477a8f6415498d44aa88b5bd6f97efdbda8f43edbd076dbd77d88e64510637f69a6eb106bc946b987787259228df878f79bc758f70064ce9ce846c0b0cee9999711a6d47871aa50ba813efcd04e4eb787f36553577697027e1a24daa417b01d3b670acbf0277f37b603a49d54f5079535ee870053d2716b7240b7c7e8fb726b50505c3a347209563f360b8b4784110ccffcbde65f1826f815df77dc6e72d5987cb7c27c3a0ede270e052293c2ed4dfa3e181a53f956573ea27fc1bd407f0fe2197fd6b084975f98ead317b5b7b72ffca9a954101be5022f841c5b4d5ccd5d51f238212b120360ad055e20a8c140cb941ca43290161b55af9e73a1d19abb193ccabaa5debc02abffd541d84bc30efd4e88f7b9e24f5d9d6a082b48a2b948ad228cf5656f5a1cdd1fc9f36d3593bcf333628152432b939c660bbe037a09e5368ba6266793dd849c6a78caaaf8406635eafceff90d1c8938045ad6540dc6f3da0d08b5979c88e59084075bfaa4fc3f55eab190345d162ee8fac8614a3a16ced34b077ca6f925559cc71b7582cc123fdff901e2dc0780953bf1b2869dceb478f4dfc151d1d6776a7c3b4447d9eebbe06fbcb271a019cb76a90599776391ed75c364543e40c84003de037107554e66cb00684204f09e34e226ed9cd0adc0d349c04505f3870a88c6c4e994feb5f8b0c3135bbb4b3edc784a32c07fe2c9cbb828140cd95641a9c294f8575a033a7e15533d336d6d2d1d42ac12de693a56b4599aa5b0e9ceadcf79cb8af944852ba31c2e79a4ec29d786ca607ee73fe15b38f24004536ab113353d57eca490945fc597279b8cc44c7ef88358f5ba0ddcf2a216dfbb5a61a4e63b62b45d83ade5322b0745f197b5fcf4726dffc0680290423fb460bebe919ca0a0275ce870723aba6cc80f47cbe7cfd49efa892339b06236329bfbd9760aa7b655792ae5f572f0826e1d032f7bd326a5294d0f6dfa5669227e066bfdab24bc3c91414bae5f093d15b786f50bf953db3e949bb26e514429ce3e49d83750b99f3f24103e396523a85bf445e4559041c3d9e722afbed9c80cdb236a865c8f127ec779eb567240c6a2758bb806235225f4aa3b001ad39ad61cc17afd243656b2431db2b5a245fcb181f00e6c89974e593edec8b57cfb0e159fd38770797f6cdd0d55e98a2a0d8346608a1c79bed420f79c41295093068a183165fa81b16465476a2b3bfa2f57cafbe527b5b1142d43511a873598ff1f66aff588eb73b4677d8c1b6b4e8f4a1e8a5c70c6d5fba894213fe3e0cc33c3c2f32f76b5c452fe9beef24f63b22297f39b035a5a7699d1e5d56604b5d2deb22f40ccc7fe4961f71037316ac32e0fdd937556500d1fbd5b55af3c591a53bf294576c054782b865a401276f9d564e938798ac7c7f5e17d28d2383296a7c0ba4c2febebc076106c39c417e2139a51529fea0321a2fa9603da430f01b39893f0945c0bb7293363017c6b779066bdea3edf1d45a22c6a2746fd8c795ba2e25294db8fe1cc5e42c3572dce9c42e148678f79658f0dca97834b84d53bb71beacd34bcea8c650f2b43448dcbae77394503be48ea608e52b07a4ebee4d1d374876de70c0dc105529a805056c41711feea010123f863ecda99a519ec5953a763a236ae0d325e6bb7a8b81600fcfed252181d23206853888f3b4cecee8b5f3b7147e60b18520077f5fd7156542b467a4c3f17873c35dd26fff2058e538ec63425dd302ed0469605998fc27f7c1ae64cdcf941b0a79ab8b17bc1403bce2528e14a98cfed0c7129ecfdf991dc569fdce0e8eb20eb9f42a2db6e2e94139cb5973d873ce760bf9a416c43200001018667cb3e45d9de9ef36549cce1b9580c75be53cffa589cad30626e706ab3007d4d46189ac7f390cd40b289285387a8adbe10601bc96a164e532e9ce9ee0209a813e8b97f95d624a6fcb12eda9be44968e0f0a32174461d91e3c17c4fcdae9e84149615f1263c102c09be43f5610609e7a41e55f0c79f7dfc320e02bf62091f98583661fc4d2c60bc9078bef6d42277eb20f39a147c68b129aa8185ed89bcfd5053d2c966ac411562e34ee59fabae8584987d610282d817a6a2e4d2aeea65baf5d01be2a0746d7b4d5aa206cb6f8b6b139e59ca2ca92d05739bc92f663f133fd6bc187745fdba67e0a7758447749362c22c05e096bbc9d21be00e69dab7908c24d3e60200b54bc5f435f0917a62de5c57b1c2c0e69104032415b4b9c2f86713991fecb72833e3901637f8296451e8dcd2b680dcbf5a813fc0b82c730039c0c06cc4a023fa6d1b0a015174d0977ff1dd4cb7159c5112866a81b2b4da613e9c61b4df7156610cb3253bd685eee67713ab2bfd6f39f744ba17a00ed51d85b8b834d884e6009d575719e28c40d99a42ad8ef4d410524cca81e84b48f688ea3919b0429a972de0173ab19b8a38d43568d77be221274651d4934e2224e8a08020fb044a9ba97c4c0383fb10098fbe6b5403521449787f85d6237aadabc659af84868b671271ace24acc4d6dc623586ab32c01cb35f789be2b08d3b9e11f6b81b9cbe88e09a75220ad420608f8060d5cdf46e31aeb070ce031e41b0b8b3a8a213ce25a763efd9eba2741ac9dddc62f7a03343539c1013650f820ef024024f623f52e3f7baf9768c7e046218162949ba1944d5c760402285fe2cedba442beb7f19880f363b48353e12bf1245ee6fb81bb1b96a9d772334050baa861569e44f6599a7891f971160a00ead488585297fe710c6065f2e8e402c9086ea56c112829c79d4c55a2dd8d8fe822ef28e5fc77d123cf828190323db8a12635cc955d0688a1e3075b8f7837196c8ee4c057e167dd02862ae3a968f09943ec80802d1e0c4e2175739caa4aab74ccb236df0b266abc2ed1fb71ab5bac85284bfbf6f8ef4b11e227b07c559dff5d3500406bb607c7bf16303f4f800b6ba9d4f8c5e8a9edcbb5f8c29a3cb436cda7814dac3176ad9105faada7f6f9d0082948e72cb447670c2d6f8e420af2523946340b5f019777c46c6bb758f16b81902d2491b3610190cc6f53312071305d0603deaba7c31095d3381acff4d8a4267469e4e62e163912a0bd79232e2fc8c32a5b74344bbf984ec8a84841764b48794ed564822a954185c5973732cdcd2a920cdf70e4126ff6e0e1c0a8b97a990cb77adfa26e8d70da99d7d80fc030366002899fc5554c71a31a4ced00b58f3359ffb22e5d27a684ce2dfeec96baba02678f688ef19a05630c6df7a791ce046871bb9df83f4e9b812802ae54f547813d0b43888d9d63fd978031c38079b9a3929e7de45032c94f638f9ea847df123489eb2987b7ac58f3d5f238ac3709fc14ae862cb5537ea5c759dc3c07418a80380f086a7ceb7314349a7b6bc077e09b8f0e40e9dbf8713cde19e3b7e34625369fe6fa13d3b0db6697bc59079e284e99153b5c386ae734c2c7b34e4b1ff575fc2a6b16a1c52e902692ccf300421bc0ae5868f1c9fa7a5495244d00bd45ec9e7780f2fbdfe215b6aba3acf8d620672c848f43d12cba6cc13ebfb6b1b598d25829acde4d900a5b0a9393eb57d51a93f3a66907a99343da596db6a310e811a587784788a56f09b21932b0fed7662c70f9f720adeb4b9231965f3f72743596be44de24a646fe4a861a2e76807e9fd3d12478c8127049fc2ab3d32f92f487b965648115320bd59650df168aa744f77caace09f5ddf1dbc3cba42dd821f4ff87cdad7d99bff931a18205b484d38047f8351285f1e46ab5f0a5366f0b2d89c67ca29f9118e5ab404711f9b2a89421aa76f97664861ff265bca8a9a04f41a925bd97eae9d5c9722ae0eb34e0f33d61e0501aa21df2233b1ecb0d16bddbda34002db1aa03b84bba2a0f2e85b497bbc5c529b0a3f668ec738b0d06a6690ca53dc44573994df6bfa1d82f98176902d04b85edb3a24d015104c2f9ef4239aaccfef79394b622d531cad3efb70ea42d4ff2d89159e7fec48f02f3456e3544c7f1839dfd63a2c7c54a3ff72b0216a8ce365256f53f77bf77315dc0deecf4a89e501a5577e39154af2914f9e9c17f0044d2ad4074b91af3b46f32bd04f378859b59d543e41365880c5d6d5a69b566a991e58feba6199bb1e60a7a9629e0d1a036add52e9cee7d94c3fd28f3428d0834068c5e4c47f55c4223b6628f9179db48153733c9f2550cabed71497a1d69009c75427a555cc793ff975bf6287e5e90fc3ad0796821db9adb2cfb8db70a3f214b575645f4770e4d3a11f9349622816b63cd7a73a80b4ee642dd63ff473ce86d3e2566addbed940cae8953f80bbf635bdf1c511b6b7a63afccb817f3c9f18916d5069dcd401353420f8bc6fbc54e444c32f22d0c37c42fd068f1bf6fe508fc19d8f0c0c8a3042ae8310a9676fa63ec41d65f80eceb284e68249dc4c1681ce9808893f52635e86b89fb5c58bd57d3422f36a355bbbee6fc32627c59de3b701e25298372bf01b4de0b8536f7a9008b0014a61b061a26aaebf7c0572c09c51d440e4721b44ca8ffc06645a73347241df66138c6fa1317b2ab7672752f8bf8e0709066f05a2fb074c05f0288df4c0c46c197d8be6a4101220a442cbf908d97ab831215cfba17729e34608cbf97b17d5d40ae2d78e01dc197169f651fbd3a7ca81b3313f8ee25eaa282b36c62d0c9bcefe588bc80cf8b6a72d87de278fb7dd8f6f4444e1c7d316c851d80a2eff436bed60746f1af3a9dfbf2bd57fb5a46f10af3d3f8e4eeb7f2"}, @generic="263854654b7cecaf66257e2d850d179d78def1ac6fa6937b5543a6ab05da9ecb9c6976a286ba575e232a5492edb9ca9f8e5f2d272cad0fe1e75c85952d4c17cdfbf7f17f4d24aaa562ed1b070fbd6457a5d0cf75efd402a2a9e3dd6e5c106522aa6ef1b5ede7b1", @generic="973c0ac48c9115156fbc2d30e69df6a50b743b88d1cd9f2be1a7ed90ec59f52bbfc59e13c4d9496b5ff639b6c1ac6b29bd4d55e81abebb2b363927b7787c2449c2a4e8b3611bc92389e78af30b6675b4b9d62d64b7f459c31b824ccbf68464494b2cb81840ae2da0ddab4be625ef82fefefa24e83105d8143e6e24fc3687f07e1e96e6534720f8ac9e7dac40fdf8529e48f52f15093ff869f58fdd148b5e37c55e6160fe85ceaa049c54ac88", @generic="8c8c2b0972a2234c0131e9b72f09ee5a7294c216803d4e975481696b77446d3329c822d3010d0daf1a2628ec7af15c14da8a92ccf17be835ecb660645620c37e53ade3ab14e74c89b067467053c044780863c95a855fce474832b21d09d1329a80a2be71f32f158d726e2c14007315d399fbc6332184042f1b85c0e35dae1182799d7ec753f2cf5e7f6308f6c5b7d653872fd87400d3127f13583ffe44fc86c346fe0f4ce874c7617157d10ca8ea6c9e3cafcdede0102e66cef2a77a2d3b86ea55a47adc2cd89fb0b6802ab891a8bdc8416840fb47f2763297a5cc06cf80499dbf3936098488a8acb7434ffb0981", @generic="7f65b7c72ca8a517262f0b8530bf7230b4844b0281383b0cd465119b6eed156f5b17957c4b1f06c4fdafc1ae234e3c77efc62e9c9dbdf18648b728427e8b5fe364661dc5bf640909601732e04ee94002927dc9b359a2218a5202dc500686e9fc8132f1c2b1602b7a5cd6ec03cf16881fb369a3f850fb38bdeab96d7568f45def138f773c93be75ba999ad923e25a72592e28124bef80fb219ad2e48d0311fe9d80ad3b2caa979f2ef552dcf96760ba30f68ce9da237d8070c94527b056e9335b8309d3d87a89ddd02d84", @typed={0x8, 0x62, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}, @generic="b2a91b438ea006220a10adb9e17a3e14e6868fbe281606aea168d1cd837e4ba592606322ea6aa052cc369fcd43066ff660"]}, @typed={0x8, 0x74, @ipv4=@dev={0xac, 0x14, 0x14, 0x11}}, @generic="aed918b8204c378bf0eb14698000c7822334443322abf83613cd5b0dd51a76bc95698f04f4f8263bd129a7d8937c2605b7cdfe983d2bbe3f86af9f63f27c4e8204a6bddffe8a41aaf41275288aa493e6fe615c641306f6f129881de1cae9e047e84fb9265630b1e39b1e2611e690844942d89be28615cb7ff635fdecfb1a8e33246db282ff2805518264ab802bc223783347067565a69d3edf681df9501248a86ac5b323e74ff8e3f069d519f5fc03ee07"]}, 0x13e8}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000200)={0x0, r3}) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000004c0)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000380)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000002a00)='./file1\x00', &(0x7f0000002980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000340)='./file0\x00', r5, r6, 0x100) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=@setlink={0x28, 0x13, 0x309, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa}]}, 0x28}, 0x1}, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xdb, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 15:48:01 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x181440, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x6, 0x4) [ 179.972384] should_fail.cold.4+0xa/0x11 [ 179.976465] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 179.981590] ? save_stack+0xa9/0xd0 [ 179.985231] ? save_stack+0x43/0xd0 [ 179.988881] ? kasan_kmalloc+0xc4/0xe0 [ 179.992779] ? kmem_cache_alloc_trace+0x152/0x780 [ 179.997640] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 180.002842] ? __list_lru_init+0x4d6/0x840 [ 180.007093] ? alloc_super+0x976/0xb10 [ 180.010995] ? vfs_get_super+0x6e/0x270 [ 180.014985] ? proc_get_tree+0x88/0xb0 [ 180.018889] ? vfs_get_tree+0x1cb/0x5c0 [ 180.022878] ? do_mount+0x6c1/0x1fb0 [ 180.026606] ? ksys_mount+0x12d/0x140 [ 180.030419] ? __x64_sys_mount+0xbe/0x150 [ 180.034582] ? do_syscall_64+0x1b9/0x820 [ 180.038657] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.044041] ? save_stack+0xa9/0xd0 [ 180.047683] ? lock_acquire+0x1e4/0x540 [ 180.051667] ? fs_reclaim_acquire+0x20/0x20 [ 180.056005] ? lock_downgrade+0x8f0/0x8f0 [ 180.060168] ? __x64_sys_mount+0xbe/0x150 [ 180.064333] ? check_same_owner+0x340/0x340 [ 180.068672] ? rcu_note_context_switch+0x730/0x730 [ 180.073621] __should_failslab+0x124/0x180 [ 180.077875] should_failslab+0x9/0x14 [ 180.081674] kmem_cache_alloc_trace+0x2cb/0x780 [ 180.086340] ? kasan_kmalloc+0xc4/0xe0 [ 180.090236] __memcg_init_list_lru_node+0x185/0x2d0 [ 180.095252] ? kvfree_rcu+0x20/0x20 [ 180.098872] ? __kmalloc_node+0x47/0x70 [ 180.102840] __list_lru_init+0x4d6/0x840 [ 180.106891] ? list_lru_destroy+0x500/0x500 [ 180.111214] ? prealloc_shrinker+0x213/0x480 [ 180.115614] ? __init_waitqueue_head+0x9e/0x150 [ 180.120274] ? inactive_list_is_low+0x850/0x850 [ 180.124937] ? __lockdep_init_map+0x105/0x590 [ 180.129449] alloc_super+0x976/0xb10 [ 180.133159] ? destroy_unused_super.part.11+0x110/0x110 [ 180.138517] ? lock_downgrade+0x8f0/0x8f0 [ 180.142661] ? kasan_check_read+0x11/0x20 [ 180.146800] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 180.151402] ? kasan_check_write+0x14/0x20 [ 180.155629] ? do_raw_spin_lock+0xc1/0x200 [ 180.159856] ? ns_test_super+0x50/0x50 [ 180.163735] sget_fc+0x269/0x950 [ 180.167096] ? compare_single+0x10/0x10 [ 180.171066] ? alloc_super+0xb10/0xb10 [ 180.174946] ? kasan_kmalloc+0xc4/0xe0 [ 180.178828] ? __kmalloc_track_caller+0x311/0x760 [ 180.183666] ? proc_root_lookup+0x60/0x60 [ 180.187809] vfs_get_super+0x6e/0x270 [ 180.191604] proc_get_tree+0x88/0xb0 [ 180.195310] vfs_get_tree+0x1cb/0x5c0 [ 180.199103] do_mount+0x6c1/0x1fb0 [ 180.202633] ? check_same_owner+0x340/0x340 [ 180.206939] ? lock_release+0xa30/0xa30 [ 180.210902] ? copy_mount_string+0x40/0x40 [ 180.215149] ? kasan_kmalloc+0xc4/0xe0 [ 180.219029] ? kmem_cache_alloc_trace+0x318/0x780 [ 180.223860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 180.229385] ? _copy_from_user+0xdf/0x150 [ 180.233522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 180.239056] ? copy_mount_options+0x285/0x380 [ 180.243541] ksys_mount+0x12d/0x140 [ 180.247157] __x64_sys_mount+0xbe/0x150 [ 180.251122] do_syscall_64+0x1b9/0x820 [ 180.254996] ? finish_task_switch+0x1d3/0x870 [ 180.259493] ? syscall_return_slowpath+0x5e0/0x5e0 [ 180.264410] ? syscall_return_slowpath+0x31d/0x5e0 [ 180.269325] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 180.274327] ? prepare_exit_to_usermode+0x291/0x3b0 [ 180.279451] ? perf_trace_sys_enter+0xb10/0xb10 [ 180.284108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 180.288950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.294122] RIP: 0033:0x455ab9 [ 180.297293] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.316574] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 180.324275] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 180.331533] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 180.338791] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 180.346068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 180.353331] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000012 15:48:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d34578f762070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x241, 0x83) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x2287, 0xa07000) 15:48:01 executing program 3: syz_read_part_table(0x40, 0x227, &(0x7f0000000340)=[{&(0x7f0000000000)="1eb76bd2c79e5786d4bb19622455c78094d14653ceea65e8f041d4dbd3acf05cfc14cdeadb252132110badb58e06d49cd149962c62d0afb68622d4c88b3343642d8da3bd25c80d912fe0082dd598b62ab185791000b9f123968e7ab3c55e1b6a0083630f652c93c0", 0x68, 0x8000}, {&(0x7f0000000080)="6cba42293ef7d9c641d6772fc97faa45e60c344d109041452963059ed0f8dc2abd6cadf4732071ce38443d3d72d6fc213830a221ef6e38ca4be6abbc515f1d6b9fb19a1cf1357d116918", 0x13, 0xb1b9}, {&(0x7f0000000280)="7ecc3fa3df8adaab52c3e07a18936acd9746dd5a256c0d1e9819835ae9be6f1369d46fdc6624978c9c55feb9c549cc62d5643244fc7ff2149b54751ceab837fa37c758612444eb9ea8a0393e073d31b9562b83374be9b6fc90c5c88ca26bc0e56a1c30ddf9a90161f0e784698417cb55b8e7e1ae3d032cbf805ac32632ec954110952117816a900ee85d0c5a5946b785d89972f5ed0000", 0x97, 0x3ff}]) [ 180.383698] loop0: AHDI p2 p4 [ 180.384148] FAT-fs (loop6): bogus number of reserved sectors [ 180.389684] loop0: p2 start 2020327233 is beyond EOD, [ 180.392855] FAT-fs (loop6): Can't find a valid FAT filesystem [ 180.392865] truncated 15:48:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="4ae30000000000000200000000000000020000004000000000b10500000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000008ac00000000000000000000000000000000000000000000800000000100000000000000000000000101000000000000010001000000000009000000000000000000000000000000000000000000000004010000000000000000000000000000000000000000000000000000000000000000000000000000000088df4f0f2bbd"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40c180, 0x0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='ifb0\x00', 0x4}) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x3ff, 0x6}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000140)={r4, 0x1000}, 0xc) 15:48:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x9) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xfffffffffffffffc) [ 180.492952] loop0: AHDI p2 p4 [ 180.496835] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:01 executing program 6: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000180)=@ipx={0x4, 0x0, 0x0, "5e523c6cd3d5"}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)='7', 0x1}], 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="880000000000000008010000ff7f0000752b7e4f33afd0588ed86fdf0bc9668726cf6c97823e131b1570d24e2d2a33c998c9a953bbf636a45bc9b306e4a4e048c52be389dc9124ad48d7353b0e4ed1c7355d38619a80efab563127abf3aa9eb884b3cd19ecbe5976b886104baaf25a0b72d2996bb3374bef4e3d7054c7ff9516e5c60000000000008000000000000000ff000000fc030000f83c12adffb484f64d927f0b7812d1b5bebfcb97ec24b78ef84456abb64d82cd257de69ffa17d9e34304f0068d5579d0d8977137e303ae7ce41ce418df76c246ad941556e13179ac70e3945bd1720af02697633cda81860ca3040083665ddf2e161915cc0b925246d1a0d8356a32c32581774b606c70c923"], 0xffffffffffffff9a}, 0x100000000000040) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x80) ioctl$KVM_SMI(r1, 0xaeb7) 15:48:01 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="7a82a0da3554ffb893346144b576f6ffb67f7663f78a991b4b150b6d3c80c9af85f6979f36c5b858b74a0e93d3943ca6514463e9fef9c27db0abc7eb56027dca352db604", 0x44, 0xfffffffffffffff8}], 0x0, &(0x7f0000000300)='\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x3, 0x80000000, 0x1c, &(0x7f0000000200)="8f210000000000461c04f2d36524779e4ae897dba0d76503413ef22f"}) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:01 executing program 4 (fault-call:11 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:01 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff000000000000000000"], 0x5e) 15:48:01 executing program 2: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:01 executing program 0: syz_read_part_table(0x48, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1f, 0x400400) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x4, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 15:48:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000788000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="01804e58000000000000000008004510003c000000000000907800000000ffffffff0000000000289078"], &(0x7f0000000380)) membarrier(0x1, 0x0) 15:48:01 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000000)={0x2, 0x0, [{0x80000008, 0x8000, 0x7, 0x81, 0x6, 0x390}, {0x80000007, 0x7, 0x2, 0x7, 0x4, 0x8000, 0xe04}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="3b8d201c1f66c2"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 180.757184] Dev loop0: unable to read RDB block 1 [ 180.762264] loop0: AHDI p2 p4 [ 180.765510] loop0: partition table partially beyond EOD, truncated [ 180.781457] loop2: AHDI p2 p4 [ 180.788266] loop2: p2 start 2020327233 is beyond EOD, truncated [ 180.792523] FAULT_INJECTION: forcing a failure. [ 180.792523] name failslab, interval 1, probability 0, space 0, times 0 [ 180.805662] CPU: 0 PID: 12715 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 180.812138] loop0: p2 start 2020327233 is beyond EOD, [ 180.814064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.814069] Call Trace: [ 180.814093] dump_stack+0x1c9/0x2b4 [ 180.814109] ? dump_stack_print_info.cold.2+0x52/0x52 [ 180.814130] ? perf_trace_lock+0xde/0x920 [ 180.819428] truncated [ 180.828774] should_fail.cold.4+0xa/0x11 [ 180.828794] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 180.828812] ? save_stack+0xa9/0xd0 [ 180.828831] ? save_stack+0x43/0xd0 [ 180.863726] ? kasan_kmalloc+0xc4/0xe0 [ 180.867604] ? kmem_cache_alloc_trace+0x152/0x780 [ 180.872432] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 180.877606] ? __list_lru_init+0x4d6/0x840 [ 180.881828] ? alloc_super+0x976/0xb10 [ 180.885703] ? vfs_get_super+0x6e/0x270 [ 180.889686] ? proc_get_tree+0x88/0xb0 [ 180.893563] ? do_mount+0x6c1/0x1fb0 [ 180.897271] ? ksys_mount+0x12d/0x140 [ 180.901062] ? __x64_sys_mount+0xbe/0x150 [ 180.905196] ? do_syscall_64+0x1b9/0x820 [ 180.909246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.914634] ? lock_acquire+0x1e4/0x540 [ 180.918599] ? fs_reclaim_acquire+0x20/0x20 [ 180.922909] ? lock_downgrade+0x8f0/0x8f0 [ 180.927045] ? __x64_sys_mount+0xbe/0x150 [ 180.931188] ? check_same_owner+0x340/0x340 [ 180.935497] ? rcu_note_context_switch+0x730/0x730 [ 180.940417] __should_failslab+0x124/0x180 [ 180.944641] should_failslab+0x9/0x14 [ 180.948430] kmem_cache_alloc_trace+0x2cb/0x780 [ 180.953089] ? kasan_kmalloc+0xc4/0xe0 [ 180.956967] __memcg_init_list_lru_node+0x185/0x2d0 [ 180.961971] ? kvfree_rcu+0x20/0x20 [ 180.965586] ? __kmalloc_node+0x47/0x70 [ 180.969558] __list_lru_init+0x4d6/0x840 [ 180.973623] ? list_lru_destroy+0x500/0x500 [ 180.977936] ? prealloc_shrinker+0x213/0x480 [ 180.982333] ? __init_waitqueue_head+0x9e/0x150 [ 180.986990] ? inactive_list_is_low+0x850/0x850 [ 180.991651] ? __lockdep_init_map+0x105/0x590 [ 180.996139] alloc_super+0x976/0xb10 [ 180.999847] ? destroy_unused_super.part.11+0x110/0x110 [ 181.005200] ? lock_downgrade+0x8f0/0x8f0 [ 181.009340] ? kasan_check_read+0x11/0x20 [ 181.013477] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 181.018067] ? kasan_check_write+0x14/0x20 [ 181.022290] ? do_raw_spin_lock+0xc1/0x200 [ 181.026513] ? ns_test_super+0x50/0x50 [ 181.030389] sget_fc+0x269/0x950 [ 181.033747] ? compare_single+0x10/0x10 [ 181.037710] ? alloc_super+0xb10/0xb10 [ 181.041583] ? kasan_kmalloc+0xc4/0xe0 [ 181.045460] ? __kmalloc_track_caller+0x311/0x760 [ 181.050295] ? proc_root_lookup+0x60/0x60 [ 181.054431] vfs_get_super+0x6e/0x270 [ 181.058219] proc_get_tree+0x88/0xb0 [ 181.061940] vfs_get_tree+0x1cb/0x5c0 [ 181.065735] do_mount+0x6c1/0x1fb0 [ 181.069262] ? kasan_check_read+0x11/0x20 [ 181.073412] ? do_raw_spin_unlock+0xa7/0x2f0 [ 181.077811] ? copy_mount_string+0x40/0x40 [ 181.082042] ? retint_kernel+0x10/0x10 [ 181.085923] ? copy_mount_options+0x1d9/0x380 [ 181.090409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.095932] ? copy_mount_options+0x285/0x380 [ 181.100414] ksys_mount+0x12d/0x140 [ 181.104032] __x64_sys_mount+0xbe/0x150 [ 181.107995] do_syscall_64+0x1b9/0x820 [ 181.111871] ? finish_task_switch+0x1d3/0x870 [ 181.116353] ? syscall_return_slowpath+0x5e0/0x5e0 [ 181.121268] ? syscall_return_slowpath+0x31d/0x5e0 [ 181.126186] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 181.131193] ? prepare_exit_to_usermode+0x291/0x3b0 [ 181.136217] ? perf_trace_sys_enter+0xb10/0xb10 [ 181.140876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.145710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.150889] RIP: 0033:0x455ab9 [ 181.154062] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.173272] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.180968] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 181.188227] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 181.195481] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 15:48:02 executing program 4 (fault-call:11 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:02 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x0, 0xfffffffffffffffd) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) [ 181.202735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 181.209991] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000013 [ 181.225988] Dev loop3: unable to read RDB block 1 [ 181.230969] loop3: AHDI p2 p4 [ 181.234210] loop3: partition table partially beyond EOD, truncated [ 181.240842] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000600)={&(0x7f00000002c0)=@rc, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/134, 0x86}, 0x0) syz_mount_image$f2fs(&(0x7f0000000200)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x100, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="d199ffa41cfba1e55e04795fa44f126220c8728066d9f139c45c232756c08687735f1609fd6792dcc56128bce2b490864c405c19728fc76459d30e84649745788de35acf332c7da8d5889229c706dc121757d572257c86f330128bc5e787474b0639a38bb791bd3b82a4f138c4d17aa45363d9c45cb914be4cbc", 0x7a, 0x8}, {&(0x7f00000003c0)="fdb80da699f14f797ba342edcae4b29d388399d37c076030c1db35a74e6b34660912bb193a4d631b791b6e2932b680c33dcfc2412f73e260cb10181dc4a8a1a48c69b4a7738be247361c10f7e870b1245cd6aa8089393a5257a1c8820baff48bee8852347e5838ceba870d3d657773b8c034440c38790d9b893fb4c7ef4ef81bc9ba2c0a9e9f4d7f83d18df31f0f46ffcd1dd2b2b9835e56a656ccf41453c343b7ce8727dfb6077e74434201994534092b21", 0xb2, 0x101}, {&(0x7f0000000640)="7eb0592b18d36775f0c9aacf47b4a539507415952607db4f7940a599944d244831c8adf60237d215bd865f0dbd7e6ad73c8928f6c75f5b9ad064805577b54644369380a2b4f44d49ef1994dd217df7b72b00e670bac3c1cfaab5b038ac5dfe34863df0181f3e93a34fd773f82ec76b5ee0266d290ccb9b7c25ce3e253d6cf653dc80a6ad8422a25a5b69d5e7b0b3340047419a45a3968e2c562fc979f9527a775866cfe786e05fc73e11a931062cdac6b59a424757a1ecc452eea3a57e22e88e54fccbea", 0xc4, 0x401}, {&(0x7f0000000280), 0x0, 0x3}], 0x2, &(0x7f0000000500)={[{@nouser_xattr='nouser_xattr', 0x2c}]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x40001, &(0x7f0000000180)="6729a7cdf1876e14d1bf3ba7ac61d6c99b6e2725e919d4cdee8d858914e730f581b71ef73d118aae4dfe86231c07c8738d6875d48066ea57150955b107b651e476ded4a6ea645f5cbaf7033177d7128dbe3fa0fa239fb0a7708305d472e50012b7e4575b9e3ce3df") 15:48:02 executing program 3: syz_read_part_table(0x2, 0xaaaaaaaaaaaacf6, &(0x7f0000000100)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596d263635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb780a340956000000001802e5541a482109f14336a332", 0xee, 0x5}]) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x400080, 0x0) r0 = accept$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x14) connect$packet(r0, &(0x7f0000000240)={0x11, 0x19, r1, 0x1, 0x102, 0x6}, 0x14) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2, 0x80001) [ 181.325939] 9pnet: Insufficient options for proto=fd [ 181.334961] Dev loop0: unable to read RDB block 1 [ 181.340008] loop0: AHDI p2 p4 [ 181.343247] loop0: partition table partially beyond EOD, truncated [ 181.361953] FAULT_INJECTION: forcing a failure. [ 181.361953] name failslab, interval 1, probability 0, space 0, times 0 15:48:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x82029, 0x4) [ 181.362828] F2FS-fs (loop5): Unable to read 1th superblock [ 181.373291] CPU: 0 PID: 12732 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 181.387301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.396684] Call Trace: [ 181.399290] dump_stack+0x1c9/0x2b4 [ 181.402934] ? dump_stack_print_info.cold.2+0x52/0x52 [ 181.408151] ? __kernel_text_address+0xd/0x40 [ 181.410214] loop0: p2 start 2020327233 is beyond EOD, [ 181.412659] ? unwind_get_return_address+0x61/0xa0 [ 181.412677] should_fail.cold.4+0xa/0x11 [ 181.412698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 181.417986] truncated [ 181.422893] ? save_stack+0xa9/0xd0 [ 181.422909] ? save_stack+0x43/0xd0 [ 181.422922] ? kasan_kmalloc+0xc4/0xe0 [ 181.422940] ? kmem_cache_alloc_trace+0x152/0x780 [ 181.434881] F2FS-fs (loop5): Unable to read 2th superblock [ 181.438083] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 181.438095] ? __list_lru_init+0x4d6/0x840 [ 181.438113] ? alloc_super+0x976/0xb10 [ 181.438130] ? vfs_get_super+0x6e/0x270 [ 181.447488] F2FS-fs (loop5): Unable to read 1th superblock [ 181.450470] ? proc_get_tree+0x88/0xb0 [ 181.450486] ? vfs_get_tree+0x1cb/0x5c0 [ 181.450501] ? do_mount+0x6c1/0x1fb0 [ 181.450512] ? ksys_mount+0x12d/0x140 [ 181.450522] ? __x64_sys_mount+0xbe/0x150 [ 181.450541] ? do_syscall_64+0x1b9/0x820 [ 181.502590] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.507947] ? save_stack+0xa9/0xd0 [ 181.511562] ? lock_acquire+0x1e4/0x540 [ 181.515521] ? fs_reclaim_acquire+0x20/0x20 [ 181.519830] ? lock_downgrade+0x8f0/0x8f0 [ 181.523961] ? __x64_sys_mount+0xbe/0x150 [ 181.528103] ? check_same_owner+0x340/0x340 [ 181.532409] ? rcu_note_context_switch+0x730/0x730 [ 181.537326] __should_failslab+0x124/0x180 [ 181.541548] should_failslab+0x9/0x14 [ 181.545338] kmem_cache_alloc_trace+0x2cb/0x780 [ 181.549995] ? kasan_kmalloc+0xc4/0xe0 [ 181.553871] __memcg_init_list_lru_node+0x185/0x2d0 [ 181.558875] ? kvfree_rcu+0x20/0x20 [ 181.562487] ? __kmalloc_node+0x47/0x70 [ 181.566447] __list_lru_init+0x4d6/0x840 [ 181.570496] ? list_lru_destroy+0x500/0x500 [ 181.574803] ? prealloc_shrinker+0x213/0x480 [ 181.579196] ? __init_waitqueue_head+0x9e/0x150 [ 181.583952] ? inactive_list_is_low+0x850/0x850 [ 181.588611] ? __lockdep_init_map+0x105/0x590 [ 181.593102] alloc_super+0x976/0xb10 [ 181.596820] ? destroy_unused_super.part.11+0x110/0x110 [ 181.602173] ? lock_downgrade+0x8f0/0x8f0 [ 181.606311] ? kasan_check_read+0x11/0x20 [ 181.610446] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 181.615022] ? kasan_check_write+0x14/0x20 [ 181.619243] ? do_raw_spin_lock+0xc1/0x200 [ 181.623468] ? ns_test_super+0x50/0x50 [ 181.627339] sget_fc+0x269/0x950 [ 181.630693] ? compare_single+0x10/0x10 [ 181.634656] ? alloc_super+0xb10/0xb10 [ 181.638531] ? kasan_kmalloc+0xc4/0xe0 [ 181.642496] ? __kmalloc_track_caller+0x311/0x760 [ 181.647326] ? proc_root_lookup+0x60/0x60 [ 181.651464] vfs_get_super+0x6e/0x270 [ 181.655251] proc_get_tree+0x88/0xb0 [ 181.658951] vfs_get_tree+0x1cb/0x5c0 [ 181.662738] do_mount+0x6c1/0x1fb0 [ 181.666264] ? kasan_check_write+0x14/0x20 [ 181.670484] ? copy_mount_string+0x40/0x40 [ 181.674703] ? kasan_kmalloc+0xc4/0xe0 [ 181.678580] ? kmem_cache_alloc_trace+0x318/0x780 [ 181.683410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 181.688933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.694456] ? copy_mount_options+0x285/0x380 [ 181.698950] ksys_mount+0x12d/0x140 [ 181.702563] __x64_sys_mount+0xbe/0x150 [ 181.706528] do_syscall_64+0x1b9/0x820 [ 181.710404] ? finish_task_switch+0x1d3/0x870 [ 181.714887] ? syscall_return_slowpath+0x5e0/0x5e0 [ 181.719809] ? syscall_return_slowpath+0x31d/0x5e0 [ 181.724726] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 181.729730] ? prepare_exit_to_usermode+0x291/0x3b0 [ 181.734736] ? perf_trace_sys_enter+0xb10/0xb10 [ 181.739392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.744226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.749400] RIP: 0033:0x455ab9 [ 181.752569] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.771742] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.779436] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 181.786692] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 181.793946] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 181.801199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 181.808451] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000014 15:48:03 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair(0x9, 0x3ba68e1ddf7155a2, 0x3, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000000)=""/102, 0x66}], 0x1, 0x0) ioctl(r0, 0x5452, &(0x7f0000000000)) 15:48:03 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000001080), 0x0, 0xffff) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/202, 0xca}], 0x1) close(r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000002c0)={0x8}, 0x1) read(r2, &(0x7f00000001c0)=""/142, 0x8e) 15:48:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x2, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 181.860480] F2FS-fs (loop5): Unable to read 2th superblock 15:48:03 executing program 0: syz_read_part_table(0x5745568200000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:03 executing program 4 (fault-call:11 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:03 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff000000000000000000"], 0x5e) 15:48:03 executing program 3: syz_read_part_table(0x1, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="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", 0x179, 0x100}]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000340)={0x80000000615b71c4, 0x10, [0x8, 0x7ffd, 0xffffffff, 0x3f]}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="570000009ae64de27a00ded0b67b0f52af6c1dbbd7b2ff4b1d2dbd6ab3d56ca74cc2f8527b067fb6c2340ad648abd719426c00df576571dc2d52af775c8c1bc68f16c8d3ee161b230a6520ba9436ae51baeb906a3f7f3f7128eba2"], &(0x7f00000000c0)=0x5f) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x7}, 0x8) 15:48:03 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000069c000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xffffffb0}}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0x200, 0x1, 0x5, 0x200, 0x5, 0x5812}) [ 181.957473] F2FS-fs (loop5): Unable to read 1th superblock [ 181.983142] F2FS-fs (loop5): Unable to read 2th superblock [ 181.995196] loop0: AHDI p2 p4 [ 182.028222] loop0: p2 start 2020327233 is beyond EOD, truncated [ 182.030508] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x59b07e00) [ 182.042121] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 182.060595] FAULT_INJECTION: forcing a failure. [ 182.060595] name failslab, interval 1, probability 0, space 0, times 0 [ 182.070517] F2FS-fs (loop5): Unable to read 2th superblock [ 182.071957] CPU: 1 PID: 12781 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 182.085884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.095233] Call Trace: [ 182.097816] dump_stack+0x1c9/0x2b4 [ 182.101430] ? dump_stack_print_info.cold.2+0x52/0x52 [ 182.106608] ? kasan_check_write+0x14/0x20 [ 182.110849] should_fail.cold.4+0xa/0x11 [ 182.114901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 182.119989] ? ksys_mount+0x12d/0x140 [ 182.123779] ? __x64_sys_mount+0xbe/0x150 [ 182.127940] ? do_syscall_64+0x1b9/0x820 [ 182.131992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.137348] ? __list_lru_init+0x409/0x840 [ 182.141572] ? lock_downgrade+0x8f0/0x8f0 [ 182.145706] ? lock_acquire+0x1e4/0x540 [ 182.149667] ? fs_reclaim_acquire+0x20/0x20 [ 182.153977] ? lock_downgrade+0x8f0/0x8f0 [ 182.158110] ? __x64_sys_mount+0xbe/0x150 [ 182.162248] ? lock_acquire+0x1e4/0x540 [ 182.166211] ? lock_acquire+0x1e4/0x540 [ 182.170173] ? fs_reclaim_acquire+0x20/0x20 [ 182.174485] ? lock_downgrade+0x8f0/0x8f0 [ 182.178622] ? check_same_owner+0x340/0x340 [ 182.182932] ? check_same_owner+0x340/0x340 [ 182.187239] ? rcu_note_context_switch+0x730/0x730 [ 182.192159] __should_failslab+0x124/0x180 [ 182.196382] should_failslab+0x9/0x14 [ 182.200166] __kmalloc+0x2c8/0x760 [ 182.203690] ? kvfree_rcu+0x20/0x20 [ 182.207303] ? __list_lru_init+0x151/0x840 [ 182.211525] __list_lru_init+0x151/0x840 [ 182.215580] ? list_lru_destroy+0x500/0x500 [ 182.219913] ? prealloc_shrinker+0x213/0x480 [ 182.224313] ? __init_waitqueue_head+0x9e/0x150 [ 182.228971] ? inactive_list_is_low+0x850/0x850 [ 182.233628] ? __lockdep_init_map+0x105/0x590 [ 182.238113] alloc_super+0x9a6/0xb10 [ 182.241814] ? destroy_unused_super.part.11+0x110/0x110 [ 182.247167] ? lock_downgrade+0x8f0/0x8f0 [ 182.251301] ? kasan_check_read+0x11/0x20 [ 182.255435] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 182.260025] ? kasan_check_write+0x14/0x20 [ 182.264247] ? do_raw_spin_lock+0xc1/0x200 [ 182.268489] ? ns_test_super+0x50/0x50 [ 182.272364] sget_fc+0x269/0x950 [ 182.275719] ? compare_single+0x10/0x10 [ 182.279681] ? alloc_super+0xb10/0xb10 [ 182.283556] ? kasan_kmalloc+0xc4/0xe0 [ 182.287429] ? __kmalloc_track_caller+0x311/0x760 [ 182.292260] ? proc_root_lookup+0x60/0x60 [ 182.296395] vfs_get_super+0x6e/0x270 [ 182.300181] proc_get_tree+0x88/0xb0 [ 182.303886] vfs_get_tree+0x1cb/0x5c0 [ 182.307672] do_mount+0x6c1/0x1fb0 [ 182.311200] ? check_same_owner+0x340/0x340 [ 182.315508] ? lock_release+0xa30/0xa30 [ 182.319473] ? copy_mount_string+0x40/0x40 [ 182.323697] ? retint_kernel+0x10/0x10 [ 182.327575] ? copy_mount_options+0x1f0/0x380 [ 182.332059] ? copy_mount_options+0x1fa/0x380 [ 182.336547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.342072] ? copy_mount_options+0x285/0x380 [ 182.346557] ksys_mount+0x12d/0x140 [ 182.350170] __x64_sys_mount+0xbe/0x150 [ 182.354133] do_syscall_64+0x1b9/0x820 [ 182.358009] ? finish_task_switch+0x1d3/0x870 [ 182.362494] ? syscall_return_slowpath+0x5e0/0x5e0 [ 182.367412] ? syscall_return_slowpath+0x31d/0x5e0 [ 182.372328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 182.377330] ? prepare_exit_to_usermode+0x291/0x3b0 [ 182.382331] ? perf_trace_sys_enter+0xb10/0xb10 [ 182.386988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.391823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.397006] RIP: 0033:0x455ab9 [ 182.400180] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.419363] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:48:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) shmget(0x3, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 182.427060] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 182.434316] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 182.441570] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 182.448826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 182.456080] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000015 15:48:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000100)=0x3) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={r2}) r3 = socket$inet(0x10, 0x3, 0x6) sendmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000240007031dfffd946f61830020200a0009000000ff1c8568f1ffffff0400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 15:48:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000600)={&(0x7f00000002c0)=@rc, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/134, 0x86}, 0x0) syz_mount_image$f2fs(&(0x7f0000000200)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x100, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="d199ffa41cfba1e55e04795fa44f126220c8728066d9f139c45c232756c08687735f1609fd6792dcc56128bce2b490864c405c19728fc76459d30e84649745788de35acf332c7da8d5889229c706dc121757d572257c86f330128bc5e787474b0639a38bb791bd3b82a4f138c4d17aa45363d9c45cb914be4cbc", 0x7a, 0x8}, {&(0x7f00000003c0)="fdb80da699f14f797ba342edcae4b29d388399d37c076030c1db35a74e6b34660912bb193a4d631b791b6e2932b680c33dcfc2412f73e260cb10181dc4a8a1a48c69b4a7738be247361c10f7e870b1245cd6aa8089393a5257a1c8820baff48bee8852347e5838ceba870d3d657773b8c034440c38790d9b893fb4c7ef4ef81bc9ba2c0a9e9f4d7f83d18df31f0f46ffcd1dd2b2b9835e56a656ccf41453c343b7ce8727dfb6077e74434201994534092b21", 0xb2, 0x101}, {&(0x7f0000000640)="7eb0592b18d36775f0c9aacf47b4a539507415952607db4f7940a599944d244831c8adf60237d215bd865f0dbd7e6ad73c8928f6c75f5b9ad064805577b54644369380a2b4f44d49ef1994dd217df7b72b00e670bac3c1cfaab5b038ac5dfe34863df0181f3e93a34fd773f82ec76b5ee0266d290ccb9b7c25ce3e253d6cf653dc80a6ad8422a25a5b69d5e7b0b3340047419a45a3968e2c562fc979f9527a775866cfe786e05fc73e11a931062cdac6b59a424757a1ecc452eea3a57e22e88e54fccbea", 0xc4, 0x401}, {&(0x7f0000000280), 0x0, 0x3}], 0x2, &(0x7f0000000500)={[{@nouser_xattr='nouser_xattr', 0x2c}]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x40001, &(0x7f0000000180)="6729a7cdf1876e14d1bf3ba7ac61d6c99b6e2725e919d4cdee8d858914e730f581b71ef73d118aae4dfe86231c07c8738d6875d48066ea57150955b107b651e476ded4a6ea645f5cbaf7033177d7128dbe3fa0fa239fb0a7708305d472e50012b7e4575b9e3ce3df") 15:48:03 executing program 0: syz_read_part_table(0x55aaffff00000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:03 executing program 4 (fault-call:11 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 182.481421] Dev loop3: unable to read RDB block 1 [ 182.486417] loop3: unable to read partition table [ 182.495593] loop0: AHDI p2 p4 [ 182.499159] loop0: p2 start 2020327233 is beyond EOD, truncated [ 182.517492] loop3: partition table beyond EOD, truncated [ 182.523236] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 15:48:03 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 182.590138] loop0: AHDI p2 p4 [ 182.596059] loop0: p2 start 2020327233 is beyond EOD, truncated [ 182.612793] Dev loop3: unable to read RDB block 1 [ 182.617768] loop3: unable to read partition table [ 182.639945] loop3: partition table beyond EOD, truncated [ 182.645572] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 182.652164] FAULT_INJECTION: forcing a failure. [ 182.652164] name failslab, interval 1, probability 0, space 0, times 0 [ 182.663515] F2FS-fs (loop5): Unable to read 1th superblock [ 182.664173] CPU: 1 PID: 12813 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 182.678125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.687477] Call Trace: [ 182.690070] dump_stack+0x1c9/0x2b4 [ 182.693694] ? dump_stack_print_info.cold.2+0x52/0x52 [ 182.698877] ? kasan_check_write+0x14/0x20 [ 182.703107] should_fail.cold.4+0xa/0x11 [ 182.707161] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 182.712254] ? ksys_mount+0x12d/0x140 [ 182.716044] ? __x64_sys_mount+0xbe/0x150 [ 182.720183] ? do_syscall_64+0x1b9/0x820 [ 182.724251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.729610] ? __sched_text_start+0x8/0x8 [ 182.733754] ? __list_lru_init+0x409/0x840 [ 182.737983] ? lock_downgrade+0x8f0/0x8f0 [ 182.742122] ? lock_acquire+0x1e4/0x540 [ 182.746097] ? fs_reclaim_acquire+0x20/0x20 [ 182.750409] ? lock_downgrade+0x8f0/0x8f0 [ 182.754548] ? __x64_sys_mount+0xbe/0x150 [ 182.758689] ? lock_acquire+0x1e4/0x540 [ 182.762659] ? lock_acquire+0x1e4/0x540 [ 182.766625] ? fs_reclaim_acquire+0x20/0x20 [ 182.770938] ? lock_downgrade+0x8f0/0x8f0 [ 182.775077] ? check_same_owner+0x340/0x340 [ 182.779392] ? check_same_owner+0x340/0x340 [ 182.783717] ? rcu_note_context_switch+0x730/0x730 [ 182.788640] __should_failslab+0x124/0x180 [ 182.792869] should_failslab+0x9/0x14 [ 182.796657] __kmalloc+0x2c8/0x760 [ 182.800185] ? kvfree_rcu+0x20/0x20 [ 182.803799] ? __list_lru_init+0x151/0x840 [ 182.808026] __list_lru_init+0x151/0x840 [ 182.812078] ? list_lru_destroy+0x500/0x500 [ 182.816390] ? prealloc_shrinker+0x213/0x480 [ 182.820782] ? __init_waitqueue_head+0x9e/0x150 [ 182.825438] ? inactive_list_is_low+0x850/0x850 [ 182.830096] ? __lockdep_init_map+0x105/0x590 [ 182.834584] alloc_super+0x9a6/0xb10 [ 182.838300] ? destroy_unused_super.part.11+0x110/0x110 [ 182.843656] ? lock_downgrade+0x8f0/0x8f0 [ 182.847796] ? kasan_check_read+0x11/0x20 [ 182.851934] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 182.856506] ? kasan_check_write+0x14/0x20 [ 182.860732] ? do_raw_spin_lock+0xc1/0x200 [ 182.864958] ? ns_test_super+0x50/0x50 [ 182.868830] sget_fc+0x269/0x950 [ 182.872195] ? compare_single+0x10/0x10 [ 182.876168] ? alloc_super+0xb10/0xb10 [ 182.880055] ? kasan_kmalloc+0xc4/0xe0 [ 182.883944] ? __kmalloc_track_caller+0x311/0x760 [ 182.888777] ? proc_root_lookup+0x60/0x60 [ 182.892911] vfs_get_super+0x6e/0x270 [ 182.896700] proc_get_tree+0x88/0xb0 [ 182.900400] vfs_get_tree+0x1cb/0x5c0 [ 182.904187] do_mount+0x6c1/0x1fb0 [ 182.907711] ? check_same_owner+0x340/0x340 [ 182.912021] ? lock_release+0xa30/0xa30 [ 182.915988] ? copy_mount_string+0x40/0x40 [ 182.920211] ? kasan_kmalloc+0xc4/0xe0 [ 182.924088] ? kmem_cache_alloc_trace+0x318/0x780 [ 182.928931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.934466] ? _copy_from_user+0xdf/0x150 [ 182.938607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.944142] ? copy_mount_options+0x285/0x380 [ 182.948638] ksys_mount+0x12d/0x140 [ 182.952253] __x64_sys_mount+0xbe/0x150 [ 182.956220] do_syscall_64+0x1b9/0x820 [ 182.960091] ? finish_task_switch+0x1d3/0x870 [ 182.964573] ? syscall_return_slowpath+0x5e0/0x5e0 [ 182.969492] ? syscall_return_slowpath+0x31d/0x5e0 [ 182.974408] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 182.979410] ? prepare_exit_to_usermode+0x291/0x3b0 [ 182.984412] ? perf_trace_sys_enter+0xb10/0xb10 [ 182.989068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.993901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.999077] RIP: 0033:0x455ab9 [ 183.002249] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.021526] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.029222] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 15:48:04 executing program 0: syz_read_part_table(0x9000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:04 executing program 2: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000000)=ANY=[]) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000140), 0x2, &(0x7f0000ffd000/0x2000)=nil, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB]) [ 183.036489] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 183.043745] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 183.050999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 183.058256] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000016 15:48:04 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x80) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000140)) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000480)="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", 0x1c7, 0x100}]) [ 183.119766] loop0: AHDI p2 p4 [ 183.144099] loop0: p2 start 2020327233 is beyond EOD, truncated [ 183.173795] Dev loop3: unable to read RDB block 1 [ 183.178746] loop3: unable to read partition table 15:48:04 executing program 6: r0 = timerfd_create(0x3, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), &(0x7f000000dfe0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000100)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:48:04 executing program 4 (fault-call:11 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:04 executing program 5: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) fcntl$lock(r0, 0x1, &(0x7f00000003c0)={0x1, 0xff7fffffffffffff, 0x8, 0xfc00000000000000, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="200040001d00d5ff44952300001038000000000000006708918d29000000bf0c2ab3da8dff9349ae7d3abe71a3cecb13313d176f00194810290134a96361a85b417a51063b8f972ce847a71c9edee22ee181e5915d4e43cc2a369569157553faeb5fdaf623c8adb574131e3f08dc60fb60bfa0522051d8857c1fb722e2a5fd6f9aa42e7575f87b0c430715a14f9cd3ef2018f275f5bc65224b824d6ab22a624f2bf756dada34376c33e65d4bba364e94b41af2926c4d004ac2ca2bd316748dac199a9d29dccfadd6a4883102590a444604fc4c52ef74830ff1876c74da66cfbbc41d8f98d87db8a85cc2660e34a759d40195", @ANYRES32=0x0], 0x20}, 0x1}, 0x0) r3 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="6a78c2b9d7093e4be54ec60dfb570f2ff2b49fc9921456eb04708312abb6dfbc7de35d8b3b426d7fd215311aa08075491f9b45cf4bc13d423f121c5d426addc9a0655495918610bd5e0cfc9ce5d715c2783b713844c6e524a88eb2813a38880449d7e6c88f11", 0x66, 0xfffffffffffffffa) fstatfs(r2, &(0x7f0000000240)=""/253) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000140)='wlan0-$${{\x00') 15:48:04 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000"], 0x65) 15:48:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x2fffc, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2000, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000300)=0xc) capget(&(0x7f0000000340)={0x19980330, r1}, &(0x7f0000000380)={0x80000000, 0x1, 0x1, 0x3, 0x3, 0xffff}) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000100)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:04 executing program 0: syz_read_part_table(0xa000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 183.199703] loop0: AHDI p2 p4 [ 183.203442] loop0: p2 start 2020327233 is beyond EOD, truncated [ 183.210335] loop3: partition table beyond EOD, truncated [ 183.215859] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 183.217243] EXT4-fs error (device sda1): ext4_has_uninit_itable:3150: comm syz-executor2: Inode table for bg 0 marked as needing zeroing [ 183.279967] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 183.305487] Dev loop3: unable to read RDB block 1 [ 183.310482] loop3: unable to read partition table [ 183.323035] loop3: partition table beyond EOD, truncated 15:48:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2) 15:48:04 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001200), 0x1000) [ 183.328604] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 183.350763] FAULT_INJECTION: forcing a failure. [ 183.350763] name failslab, interval 1, probability 0, space 0, times 0 [ 183.362114] CPU: 1 PID: 12856 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 183.370525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.379881] Call Trace: [ 183.382484] dump_stack+0x1c9/0x2b4 [ 183.386132] ? dump_stack_print_info.cold.2+0x52/0x52 [ 183.391345] ? perf_trace_lock+0xde/0x920 [ 183.395513] should_fail.cold.4+0xa/0x11 [ 183.399597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 183.404732] ? save_stack+0xa9/0xd0 [ 183.408387] ? save_stack+0x43/0xd0 [ 183.412034] ? kasan_kmalloc+0xc4/0xe0 [ 183.415936] ? __kmalloc+0x14e/0x760 [ 183.419666] ? __list_lru_init+0x151/0x840 [ 183.423921] ? alloc_super+0x9a6/0xb10 [ 183.427829] ? vfs_get_super+0x6e/0x270 [ 183.431816] ? proc_get_tree+0x88/0xb0 [ 183.435725] ? vfs_get_tree+0x1cb/0x5c0 [ 183.439717] ? do_mount+0x6c1/0x1fb0 [ 183.443447] ? ksys_mount+0x12d/0x140 [ 183.447267] ? __x64_sys_mount+0xbe/0x150 [ 183.451442] ? lock_acquire+0x1e4/0x540 [ 183.455437] ? fs_reclaim_acquire+0x20/0x20 [ 183.459778] ? lock_downgrade+0x8f0/0x8f0 [ 183.463950] ? check_same_owner+0x340/0x340 [ 183.468292] ? rcu_note_context_switch+0x730/0x730 [ 183.473244] __should_failslab+0x124/0x180 [ 183.477501] should_failslab+0x9/0x14 [ 183.481319] kmem_cache_alloc_node_trace+0x26f/0x770 [ 183.486448] ? kasan_kmalloc+0xc4/0xe0 [ 183.490361] __kmalloc_node+0x33/0x70 [ 183.494170] kvmalloc_node+0x65/0xf0 [ 183.497080] EXT4-fs error (device sda1): ext4_has_uninit_itable:3150: comm syz-executor2: Inode table for bg 0 marked as needing zeroing [ 183.497893] __list_lru_init+0x5d9/0x840 [ 183.497911] ? list_lru_destroy+0x500/0x500 [ 183.518676] ? prealloc_shrinker+0x213/0x480 [ 183.523097] ? __init_waitqueue_head+0x9e/0x150 15:48:04 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) connect$rds(r0, &(0x7f0000000140)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$TCFLSH(r0, 0x540b, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x7, 0x8, 0xc3e, 0x113a, 0x3ff, 0x1, 0xfffffffffffffffa, 0x38000000000000, 0x8, 0xffffffffffffa80a, 0x5, 0xd100}) syz_read_part_table(0xfffffffffffffffe, 0xaaaaaaaaaaaac44, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xffffffffffffff78, 0x100}]) [ 183.527780] ? inactive_list_is_low+0x850/0x850 [ 183.532472] ? __lockdep_init_map+0x105/0x590 [ 183.535787] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 183.536987] alloc_super+0x9a6/0xb10 [ 183.537009] ? destroy_unused_super.part.11+0x110/0x110 [ 183.537027] ? lock_downgrade+0x8f0/0x8f0 [ 183.537049] ? kasan_check_read+0x11/0x20 [ 183.560353] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 183.564939] ? kasan_check_write+0x14/0x20 [ 183.569165] ? do_raw_spin_lock+0xc1/0x200 [ 183.573397] ? ns_test_super+0x50/0x50 [ 183.577279] sget_fc+0x269/0x950 [ 183.580634] ? compare_single+0x10/0x10 [ 183.584595] ? alloc_super+0xb10/0xb10 [ 183.588470] ? kasan_kmalloc+0xc4/0xe0 [ 183.592348] ? __kmalloc_track_caller+0x311/0x760 [ 183.597181] ? proc_root_lookup+0x60/0x60 [ 183.601320] vfs_get_super+0x6e/0x270 [ 183.605111] proc_get_tree+0x88/0xb0 [ 183.608818] vfs_get_tree+0x1cb/0x5c0 [ 183.612605] do_mount+0x6c1/0x1fb0 [ 183.616154] ? check_same_owner+0x340/0x340 [ 183.620463] ? lock_release+0xa30/0xa30 [ 183.624428] ? copy_mount_string+0x40/0x40 [ 183.628652] ? kasan_kmalloc+0xc4/0xe0 [ 183.632529] ? kmem_cache_alloc_trace+0x318/0x780 [ 183.637362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 183.642886] ? _copy_from_user+0xdf/0x150 [ 183.647028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.652607] ? copy_mount_options+0x285/0x380 [ 183.657093] ksys_mount+0x12d/0x140 [ 183.660711] __x64_sys_mount+0xbe/0x150 [ 183.664674] do_syscall_64+0x1b9/0x820 [ 183.668557] ? finish_task_switch+0x1d3/0x870 [ 183.673044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 183.677960] ? syscall_return_slowpath+0x31d/0x5e0 [ 183.682878] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 183.687882] ? prepare_exit_to_usermode+0x291/0x3b0 [ 183.692890] ? perf_trace_sys_enter+0xb10/0xb10 [ 183.697546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 183.702378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.707558] RIP: 0033:0x455ab9 [ 183.710730] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:48:04 executing program 6: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 15:48:05 executing program 4 (fault-call:11 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 183.729939] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.737659] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 183.744917] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 183.752175] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 183.759430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 183.766689] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000017 15:48:05 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020008000000000000000000fbdbdf25"], 0xfffffffffffffd6f}, 0x1}, 0xfffffffffffffffd) r2 = socket$key(0xf, 0x3, 0x2) recvmmsg(r2, &(0x7f0000001540)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/120, 0x78, 0x1}, 0x8}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000000140)=[{&(0x7f0000001340)=""/158, 0x9e}, {&(0x7f0000001400)=""/69, 0x45}], 0x2, &(0x7f0000001480)=""/153, 0x93, 0x9}, 0x1}], 0x2, 0x40000000, &(0x7f0000000240)) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 15:48:05 executing program 0: syz_read_part_table(0x23000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 183.810948] loop0: AHDI p2 p4 [ 183.815292] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="5a1606d3d72c70330ed87cd5459c05ddc685039420bba58ad3a518ea315e485d", 0x20}], 0x1}, 0x8080) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000ac0)=""/4096) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/92, 0x200002dc}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 15:48:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mlock(&(0x7f00003cf000/0x1000)=nil, 0x1000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f00003cf000/0x3000)=nil, 0x3000, 0x0) 15:48:05 executing program 6: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000340), 0x0, 0x1ff}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="e0"]) [ 184.095410] loop0: AHDI p2 p4 [ 184.098854] loop0: p2 start 2020327233 is beyond EOD, truncated [ 184.125100] loop0: AHDI p2 p4 [ 184.134377] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:05 executing program 0: syz_read_part_table(0x3b0d, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 184.174534] FAULT_INJECTION: forcing a failure. [ 184.174534] name failslab, interval 1, probability 0, space 0, times 0 [ 184.186009] CPU: 0 PID: 12918 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 184.194454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.203815] Call Trace: [ 184.206410] dump_stack+0x1c9/0x2b4 [ 184.210050] ? dump_stack_print_info.cold.2+0x52/0x52 [ 184.215259] ? __kernel_text_address+0xd/0x40 [ 184.219768] ? unwind_get_return_address+0x61/0xa0 [ 184.224717] should_fail.cold.4+0xa/0x11 [ 184.228801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.233925] ? save_stack+0xa9/0xd0 [ 184.237574] ? save_stack+0x43/0xd0 [ 184.241221] ? kasan_kmalloc+0xc4/0xe0 [ 184.245122] ? kmem_cache_alloc_trace+0x152/0x780 [ 184.249982] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 184.255191] ? __list_lru_init+0x4d6/0x840 [ 184.259447] ? alloc_super+0x9a6/0xb10 [ 184.263349] ? vfs_get_super+0x6e/0x270 [ 184.267331] ? proc_get_tree+0x88/0xb0 [ 184.271230] ? vfs_get_tree+0x1cb/0x5c0 15:48:05 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000"], 0x65) 15:48:05 executing program 3: r0 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='.(em0\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180)='\x00', r0) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 184.275217] ? do_mount+0x6c1/0x1fb0 [ 184.278940] ? ksys_mount+0x12d/0x140 [ 184.282755] ? __x64_sys_mount+0xbe/0x150 [ 184.286916] ? do_syscall_64+0x1b9/0x820 [ 184.290996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.296381] ? save_stack+0xa9/0xd0 [ 184.300033] ? lock_acquire+0x1e4/0x540 [ 184.304024] ? fs_reclaim_acquire+0x20/0x20 [ 184.308363] ? lock_downgrade+0x8f0/0x8f0 [ 184.312523] ? __x64_sys_mount+0xbe/0x150 [ 184.316695] ? check_same_owner+0x340/0x340 [ 184.321035] ? rcu_note_context_switch+0x730/0x730 [ 184.325971] __should_failslab+0x124/0x180 [ 184.330195] should_failslab+0x9/0x14 [ 184.333983] kmem_cache_alloc_trace+0x2cb/0x780 [ 184.338658] ? kasan_kmalloc+0xc4/0xe0 [ 184.342535] __memcg_init_list_lru_node+0x185/0x2d0 [ 184.347535] ? kvfree_rcu+0x20/0x20 [ 184.351146] ? __kmalloc_node+0x47/0x70 [ 184.355104] __list_lru_init+0x4d6/0x840 [ 184.359168] ? list_lru_destroy+0x500/0x500 [ 184.363479] ? prealloc_shrinker+0x213/0x480 [ 184.367872] ? __init_waitqueue_head+0x9e/0x150 [ 184.372526] ? inactive_list_is_low+0x850/0x850 [ 184.377198] ? __lockdep_init_map+0x105/0x590 [ 184.381677] alloc_super+0x9a6/0xb10 [ 184.385393] ? destroy_unused_super.part.11+0x110/0x110 [ 184.390742] ? lock_downgrade+0x8f0/0x8f0 [ 184.394879] ? kasan_check_read+0x11/0x20 [ 184.399019] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 184.403592] ? kasan_check_write+0x14/0x20 [ 184.407808] ? do_raw_spin_lock+0xc1/0x200 [ 184.412037] ? ns_test_super+0x50/0x50 [ 184.415918] sget_fc+0x269/0x950 [ 184.419267] ? compare_single+0x10/0x10 [ 184.423226] ? alloc_super+0xb10/0xb10 [ 184.427099] ? kasan_kmalloc+0xc4/0xe0 [ 184.430980] ? __kmalloc_track_caller+0x311/0x760 [ 184.435816] ? proc_root_lookup+0x60/0x60 [ 184.439962] vfs_get_super+0x6e/0x270 [ 184.443747] proc_get_tree+0x88/0xb0 [ 184.447446] vfs_get_tree+0x1cb/0x5c0 [ 184.451232] do_mount+0x6c1/0x1fb0 [ 184.454755] ? check_same_owner+0x340/0x340 [ 184.459064] ? lock_release+0xa30/0xa30 [ 184.463033] ? copy_mount_string+0x40/0x40 [ 184.467253] ? kasan_kmalloc+0xc4/0xe0 [ 184.471123] ? kmem_cache_alloc_trace+0x318/0x780 [ 184.475951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.481490] ? _copy_from_user+0xdf/0x150 [ 184.485626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.491149] ? copy_mount_options+0x285/0x380 [ 184.495627] ksys_mount+0x12d/0x140 [ 184.499239] __x64_sys_mount+0xbe/0x150 [ 184.503199] do_syscall_64+0x1b9/0x820 [ 184.507075] ? finish_task_switch+0x1d3/0x870 [ 184.511555] ? syscall_return_slowpath+0x5e0/0x5e0 [ 184.516468] ? syscall_return_slowpath+0x31d/0x5e0 [ 184.521388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 184.526396] ? prepare_exit_to_usermode+0x291/0x3b0 [ 184.531400] ? perf_trace_sys_enter+0xb10/0xb10 [ 184.536062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 184.540901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.546075] RIP: 0033:0x455ab9 [ 184.549241] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.568372] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:48:05 executing program 4 (fault-call:11 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:05 executing program 2: syz_read_part_table(0x23000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 184.576076] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 184.583338] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 184.590590] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 184.597849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 184.605114] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000018 15:48:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x36f) r1 = add_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000200)="7ed4ae171dd84ecdd3f48a91ecdfafd01337f223a7d48f7c3ed0f622db5ba5fa403101c44b923a1bd9fa408ad0f2de55e57d35b6d59f8ab7978bf668cda471ed72ca9d680441e2764ec5c99253e436aac8fa3cafd34151a46f9b6215c8160461c41c6c08494886d73e0fd5beb9a2f02a31b78778e0d50fd834b10a4e5b8107ca3d2265a05582782922099fa8abc349b1e490a1254788e6b4d6171139859fd5ba2a7f8610f3", 0xa5, 0xfffffffffffffff9) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="2d392c7ff6cc05fafac3a4310a60a838150a262f15184c4d7f750b81530095f0fdbf83ffe1fd", 0x26, r1) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000000380)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000980)='scalable\x00', 0x9) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 15:48:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x4800) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000200)) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x104, 0x3c, 0x830, 0x70bd2d, 0x25dfdbfb, {0xd}, [@typed={0x8, 0x93, @u32=0x2}, @typed={0x14, 0x20, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @generic="8371a3b9359073f69c375c3eb436dc3533e0c46cd34f4de06ef917fad183db78b20b048f16f4e0d862c07821039db1facdf36645c1463918414ac8da04b3e03e46c21af72a5d47c0b5da270dcd1169e12e20aa1f3303f4387a7c348c050e103843347c4a3822ee1325ca26cff442ea1353f3bff7f4798b65b8ecf00d5967d37832dd33bd60a5828bdb7e1c2e96cc734e18504c2fe76d33f1adba7c221011f6d1df202ea397c0bb0cb41dfd5595abf74aa838223399a17745641b84f51152cdcf435f4a7fee57009ed0d06a", @typed={0x8, 0x3c, @uid=r1}]}, 0x104}, 0x1, 0x0, 0x0, 0x8004}, 0x20000000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:06 executing program 6: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000140)={@empty, @empty, 0x0}, &(0x7f0000000180)=0xc) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x1f, r1, 0x1, 0x8, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x15}}, 0x14) [ 184.764657] hfs: unable to parse mount options [ 184.781834] hfs: unable to parse mount options [ 184.905578] Dev loop3: unable to read RDB block 1 [ 184.910526] loop3: AHDI p2 p4 [ 184.913795] loop3: partition table partially beyond EOD, truncated [ 184.914664] loop0: AHDI p2 p4 [ 184.924582] loop3: p2 start 2020327233 is beyond EOD, truncated [ 184.936799] loop2: AHDI p2 p4 [ 184.939333] loop0: p2 start 2020327233 is beyond EOD, truncated [ 184.941309] loop2: p2 start 2020327233 is beyond EOD, truncated [ 184.970507] Dev loop3: unable to read RDB block 1 [ 184.975476] loop3: AHDI p2 p4 [ 184.978724] loop3: partition table partially beyond EOD, truncated 15:48:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001340)='|', 0x1}], 0x1, &(0x7f0000000140)=ANY=[], 0xa7}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20002, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000180)={0x20, 0x5, 0xffff, 0x7fffffff}) recvmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000ec0)=@can, 0xffffffffffffffdd, &(0x7f00000010c0), 0x0, &(0x7f0000001100)=""/60, 0x3c}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) [ 185.011628] loop0: AHDI p2 p4 [ 185.015698] loop0: p2 start 2020327233 is beyond EOD, truncated [ 185.019635] FAULT_INJECTION: forcing a failure. [ 185.019635] name failslab, interval 1, probability 0, space 0, times 0 [ 185.033082] CPU: 1 PID: 12981 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 185.041492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.050853] Call Trace: [ 185.053461] dump_stack+0x1c9/0x2b4 [ 185.057110] ? dump_stack_print_info.cold.2+0x52/0x52 [ 185.062326] ? perf_trace_lock+0xde/0x920 [ 185.066500] should_fail.cold.4+0xa/0x11 [ 185.068389] loop3: p2 start 2020327233 is beyond EOD, [ 185.070585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 185.070609] ? save_stack+0xa9/0xd0 [ 185.070625] ? save_stack+0x43/0xd0 [ 185.070640] ? kasan_kmalloc+0xc4/0xe0 [ 185.070651] ? __kmalloc+0x14e/0x760 [ 185.070667] ? __list_lru_init+0x151/0x840 [ 185.075952] truncated [ 185.081040] ? alloc_super+0x9a6/0xb10 [ 185.081057] ? vfs_get_super+0x6e/0x270 [ 185.081078] ? proc_get_tree+0x88/0xb0 [ 185.114157] ? vfs_get_tree+0x1cb/0x5c0 [ 185.118118] ? do_mount+0x6c1/0x1fb0 [ 185.121817] ? ksys_mount+0x12d/0x140 [ 185.125605] ? __x64_sys_mount+0xbe/0x150 [ 185.129745] ? lock_acquire+0x1e4/0x540 [ 185.133745] ? fs_reclaim_acquire+0x20/0x20 [ 185.138054] ? lock_downgrade+0x8f0/0x8f0 [ 185.142193] ? check_same_owner+0x340/0x340 [ 185.146504] ? rcu_note_context_switch+0x730/0x730 [ 185.151422] __should_failslab+0x124/0x180 [ 185.155646] should_failslab+0x9/0x14 [ 185.159433] kmem_cache_alloc_node_trace+0x26f/0x770 [ 185.164523] ? kasan_kmalloc+0xc4/0xe0 [ 185.168399] __kmalloc_node+0x33/0x70 [ 185.172190] kvmalloc_node+0x65/0xf0 [ 185.175891] __list_lru_init+0x5d9/0x840 [ 185.179940] ? list_lru_destroy+0x500/0x500 [ 185.184248] ? prealloc_shrinker+0x213/0x480 [ 185.188642] ? __init_waitqueue_head+0x9e/0x150 [ 185.193301] ? inactive_list_is_low+0x850/0x850 [ 185.197961] ? __lockdep_init_map+0x105/0x590 [ 185.202445] alloc_super+0x9a6/0xb10 [ 185.206147] ? destroy_unused_super.part.11+0x110/0x110 [ 185.211501] ? lock_downgrade+0x8f0/0x8f0 [ 185.215639] ? kasan_check_read+0x11/0x20 [ 185.219775] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 185.224362] ? kasan_check_write+0x14/0x20 [ 185.228593] ? do_raw_spin_lock+0xc1/0x200 [ 185.232820] ? ns_test_super+0x50/0x50 [ 185.236698] sget_fc+0x269/0x950 [ 185.240052] ? compare_single+0x10/0x10 [ 185.244021] ? alloc_super+0xb10/0xb10 [ 185.247902] ? kasan_kmalloc+0xc4/0xe0 [ 185.251788] ? __kmalloc_track_caller+0x311/0x760 [ 185.256629] ? proc_root_lookup+0x60/0x60 [ 185.260770] vfs_get_super+0x6e/0x270 [ 185.264570] proc_get_tree+0x88/0xb0 [ 185.268284] vfs_get_tree+0x1cb/0x5c0 [ 185.272081] do_mount+0x6c1/0x1fb0 [ 185.275617] ? kasan_check_write+0x14/0x20 [ 185.279842] ? copy_mount_string+0x40/0x40 [ 185.284065] ? kasan_kmalloc+0xc4/0xe0 [ 185.287939] ? kmem_cache_alloc_trace+0x318/0x780 [ 185.292773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 185.298306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.303834] ? copy_mount_options+0x285/0x380 [ 185.308329] ksys_mount+0x12d/0x140 [ 185.311956] __x64_sys_mount+0xbe/0x150 [ 185.315929] do_syscall_64+0x1b9/0x820 [ 185.319809] ? finish_task_switch+0x1d3/0x870 [ 185.324293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 185.329212] ? syscall_return_slowpath+0x31d/0x5e0 [ 185.334129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 185.339135] ? prepare_exit_to_usermode+0x291/0x3b0 [ 185.344139] ? perf_trace_sys_enter+0xb10/0xb10 [ 185.348793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 185.353630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.358804] RIP: 0033:0x455ab9 [ 185.361978] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.381184] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 185.388884] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 185.396137] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 185.403390] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 15:48:06 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xc6e, 0x600002) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0xc8, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x4d, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in6={0xa, 0xa3, 0x8, @empty, 0x6}, @in6={0xa, 0x4e21, 0x7, @loopback={0x0, 0x1}}, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x18}, 0x2}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xf}, 0xff}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x9e6f}]}, &(0x7f0000000280)=0x10) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x100000001, 0x7, 0x0, 0x5, 0x100000000, 0x5, 0x100000000, 0x9, r1}, &(0x7f0000000300)=0x20) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 185.410645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 185.417921] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000019 15:48:06 executing program 4 (fault-call:11 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000030c0)={'team0\x00', 0x0}) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800000000200000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000100)) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003c00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000003bc0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00cd1900", @ANYRES16=r1, @ANYBLOB="075e81e87dd000000000000000efffffff00", @ANYRES32=r2, @ANYBLOB="3c00020038000000000001006c725f73746174735f7265667265736a5f696e74657276616c00000000000000410003000300b5ba36610000080004008925a0d12287d02ee094ee71efdd22e283f077b04b83084e66f5b3eb6f98dfb0723c4b214dcbfb43bb37d3eff52f52f9a8cb96cc16c4779bb42709ed91aa9f868a02979a1ef3e97c305d95469eae10972a67b4bedf5f5796b3a5b061d2926849d6f51081d4d12a11e072b7aab8775437ec1709f81e35baae880dc074a26f37e08eedb05c66b297d30dac"], 0x58}, 0x1}, 0x0) 15:48:06 executing program 0: syz_read_part_table(0xffffdabe, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000440)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)='\x00', 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)="1db03f86b3a8269b639f925fafcaa48bb7c3e102e85d8986c01bb3f94a2aaa783cb33652a8438efa02aa02a117b9f20e7e047108ced9b696d5d0fe31fd35c329e9148455d3bd242c6ae466ed35a002236f55569b", 0x54, r2) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x10000, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 15:48:06 executing program 2: getrandom(&(0x7f0000000300)=""/80, 0x2ce, 0x1) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000040)=0x40, 0x4) [ 185.675591] Dev loop3: unable to read RDB block 1 [ 185.680549] loop3: AHDI p2 p4 [ 185.683834] loop3: partition table partially beyond EOD, truncated [ 185.690569] loop3: p2 start 2020327233 is beyond EOD, truncated [ 185.708427] loop0: AHDI p2 p4 [ 185.712053] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc1105511, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000002"]) [ 185.755394] Dev loop3: unable to read RDB block 1 [ 185.760397] loop3: AHDI p2 p4 [ 185.763692] loop3: partition table partially beyond EOD, truncated 15:48:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f763414") sendmmsg$unix(0xffffffffffffffff, &(0x7f00000019c0)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001d80)="c43f89b95fef18a283ab0d03f007f939", 0x10}, {&(0x7f0000001d00)="d0f6eda381ce3ee80a7cfa3def43320e0138", 0x12}], 0x2, &(0x7f0000000280)}], 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40100, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000022c0)={0x4c, 0x0, &(0x7f0000002140)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x38, 0x8, &(0x7f00000020c0)=[@fda={0x66646185, 0x7, 0x4, 0x11}, @fd={0x66642a85, 0x0, r1, 0x0, 0x1}], &(0x7f0000002100)=[0x40]}, 0xfffffffffffffff8}}], 0xdb, 0x0, &(0x7f00000021c0)="7e4ae6ba0953d43bda3ee069dda94d2232980587a1172cc38e015383e9207d4e8034e3aefbcea28aa5b5ddbf80c90c1fd8e2a3f8c357dc4ad384957600b8ef527cb72796c8f0e3fedebe67d9f24e95d8ee9d054bbbd9fc50007a330ba0f35eecce9d1aef5ea8adb38653db0898a076b47ecc52a5e9f3b1f611544287b023a5bb9849b1c0cfa48f80dcd9a40e79a8d7679136a5509f2845da9d6366f4caa78ce9446580eb87821d66c9db76a1f4ef498a10b014773c2e01403a366004fc475182db085bb5e82cdaf7792053eb12f49872cc588d777fde804fa61019"}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000002000)={0x0, r1}) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002cb, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000100)=@alg, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000180)=""/45, 0x2d, 0x5}, 0x2}, {{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000001840)=[{&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/212, 0xd4}, {&(0x7f00000015c0)=""/120, 0x78}, {&(0x7f0000001640)=""/248, 0xf8}, {&(0x7f0000001740)=""/250, 0xfa}], 0x5, &(0x7f0000000240)=""/56, 0x38, 0xdc0}, 0x4}, {{&(0x7f00000018c0)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001940)=""/113, 0x71}, {&(0x7f00000019c0)}, {&(0x7f0000001a00)=""/213, 0xd5}, {&(0x7f0000001b00)=""/117, 0x75}], 0x4, &(0x7f0000001bc0)=""/5, 0x5, 0x8000}, 0xfd}], 0x3, 0x20, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001cc0)={0x8, 0xe, 0x6, 0x0, 0x0}, &(0x7f0000001dc0)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001e00)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) get_mempolicy(&(0x7f0000002040), &(0x7f0000002080), 0x3, &(0x7f0000ffb000/0x2000)=nil, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1e, &(0x7f0000001ec0)=""/202, &(0x7f0000001fc0)=0xca) 15:48:07 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000"], 0x65) [ 185.800124] loop3: p2 start 2020327233 is beyond EOD, truncated [ 185.806951] loop0: AHDI p2 p4 [ 185.813511] FAULT_INJECTION: forcing a failure. [ 185.813511] name failslab, interval 1, probability 0, space 0, times 0 [ 185.821519] loop0: p2 start 2020327233 is beyond EOD, truncated [ 185.824857] CPU: 1 PID: 13031 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 185.839263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.848604] Call Trace: [ 185.851180] dump_stack+0x1c9/0x2b4 [ 185.854795] ? dump_stack_print_info.cold.2+0x52/0x52 [ 185.859977] should_fail.cold.4+0xa/0x11 [ 185.864030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 185.869121] ? lock_repin_lock+0x430/0x430 [ 185.873345] ? kasan_check_write+0x14/0x20 [ 185.877565] ? __schedule+0x884/0x1ed0 [ 185.881437] ? do_mount+0x6c1/0x1fb0 [ 185.885135] ? ksys_mount+0x12d/0x140 [ 185.888923] ? __sched_text_start+0x8/0x8 [ 185.893063] ? lock_acquire+0x1e4/0x540 [ 185.897030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.901775] ? check_same_owner+0x340/0x340 [ 185.906085] __should_failslab+0x124/0x180 [ 185.910303] should_failslab+0x9/0x14 [ 185.914141] kmem_cache_alloc_trace+0x2cb/0x780 [ 185.918794] ? kasan_kmalloc+0xc4/0xe0 [ 185.922669] __memcg_init_list_lru_node+0x185/0x2d0 [ 185.927669] ? kvfree_rcu+0x20/0x20 [ 185.931279] ? __kmalloc_node+0x47/0x70 [ 185.935236] __list_lru_init+0x4d6/0x840 [ 185.939278] ? list_lru_destroy+0x500/0x500 [ 185.943585] ? prealloc_shrinker+0x213/0x480 [ 185.948009] ? __init_waitqueue_head+0x9e/0x150 [ 185.952667] ? inactive_list_is_low+0x850/0x850 [ 185.957320] ? __lockdep_init_map+0x105/0x590 [ 185.961804] alloc_super+0x9a6/0xb10 [ 185.965513] ? destroy_unused_super.part.11+0x110/0x110 [ 185.970859] ? lock_downgrade+0x8f0/0x8f0 [ 185.974994] ? kasan_check_read+0x11/0x20 [ 185.979137] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 185.983801] ? kasan_check_write+0x14/0x20 [ 185.988019] ? do_raw_spin_lock+0xc1/0x200 [ 185.992237] ? ns_test_super+0x50/0x50 [ 185.996106] sget_fc+0x269/0x950 [ 185.999454] ? compare_single+0x10/0x10 [ 186.003413] ? alloc_super+0xb10/0xb10 [ 186.007283] ? kasan_kmalloc+0xc4/0xe0 [ 186.011153] ? __kmalloc_track_caller+0x311/0x760 [ 186.015980] ? proc_root_lookup+0x60/0x60 [ 186.020110] vfs_get_super+0x6e/0x270 [ 186.023905] proc_get_tree+0x88/0xb0 [ 186.027602] vfs_get_tree+0x1cb/0x5c0 [ 186.031385] do_mount+0x6c1/0x1fb0 [ 186.034910] ? check_same_owner+0x340/0x340 [ 186.039213] ? lock_release+0xa30/0xa30 [ 186.043173] ? copy_mount_string+0x40/0x40 [ 186.047389] ? kasan_kmalloc+0xc4/0xe0 [ 186.051273] ? kmem_cache_alloc_trace+0x318/0x780 [ 186.056104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.061624] ? _copy_from_user+0xdf/0x150 [ 186.065759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.071280] ? copy_mount_options+0x285/0x380 [ 186.075758] ksys_mount+0x12d/0x140 [ 186.079367] __x64_sys_mount+0xbe/0x150 [ 186.083328] do_syscall_64+0x1b9/0x820 [ 186.087201] ? syscall_slow_exit_work+0x500/0x500 [ 186.092027] ? syscall_return_slowpath+0x5e0/0x5e0 [ 186.096941] ? syscall_return_slowpath+0x31d/0x5e0 [ 186.101853] ? prepare_exit_to_usermode+0x291/0x3b0 [ 186.106852] ? perf_trace_sys_enter+0xb10/0xb10 [ 186.111502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 186.116331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.121503] RIP: 0033:0x455ab9 [ 186.124672] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.143836] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:48:07 executing program 2: keyctl$assume_authority(0x2f, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x444600) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x1009}}, 0x20) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x800000004d9, 0x4) 15:48:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f00004ee000/0x3000)=nil, 0x3000, 0x1) 15:48:07 executing program 4 (fault-call:11 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:07 executing program 0: syz_read_part_table(0x500000000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:07 executing program 3: syz_read_part_table(0x4, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951dce68a154e99e4213eac4fe6681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5", 0xffffffffffffff3f, 0xfe}]) [ 186.151526] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 186.158778] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 186.166028] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 186.173279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 186.180539] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001a 15:48:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x149000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000000c0)=0x8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2400dd3ad2080000000000000000000000", @ANYRES16=r4, @ANYBLOB="000128bd7000fcdbdf250a00000008000400080000000800050001800000"], 0x24}, 0x1, 0x0, 0x0, 0x4040800}, 0x4000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e21, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x2}}, 0x871, 0x4, 0x3, 0x9, 0x101}, &(0x7f0000000100)=0x98) 15:48:07 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000100)={r3, 0x0, 0x2000000000001}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1, 0x40}, {r1, 0x402}, {r3, 0x1}, {r2, 0x50}, {r3, 0x400}, {r4, 0x40}, {r2, 0x1000}, {r3, 0xa4}], 0x8, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0xf2}, 0x8) 15:48:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x6000, 0x1000}) clock_adjtime(0x6, &(0x7f0000000080)={0x4, 0xffffffff00000001, 0x4e6b, 0x6, 0x9, 0x7, 0x7, 0x2, 0x5, 0x6, 0x1ff, 0x1, 0x0, 0x7, 0x4, 0x7b, 0x3, 0x100, 0x7, 0x0, 0x80, 0x6a83, 0x4c52d844, 0xbef, 0x0, 0x7}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180)={0x4f5f}, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x40800, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000200)={0x3, 0x0, @pic={0x3, 0x400, 0x2, 0xad4, 0x1, 0x1, 0x3, 0x8, 0x101, 0x0, 0xfffffffffffffffb, 0x9, 0x0, 0x9, 0x4, 0x1}}) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000300)={0x4, [0x3ff, 0x8, 0x1000, 0x9]}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000340)=0x20, 0x2) clock_adjtime(0x6, &(0x7f0000000380)={0xfff, 0x8001, 0x9, 0x0, 0x4, 0x80, 0x6, 0x200, 0xfffffffffffffffd, 0x5, 0xffffffffffffff8c, 0x0, 0x4, 0x3d0, 0x4, 0x1, 0x80000001, 0x8, 0x8001, 0x0, 0x3, 0x48000000, 0x1a, 0x81e, 0x10000, 0x5}) getsockopt$inet_int(r0, 0x0, 0x1e, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000500)=0xfffffffffffffff9, &(0x7f0000000540)=0x2) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000640)={0x0, 0x0, 0x10000, 0x4, 0x0, 0x6}, &(0x7f0000000680)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000006c0)={r2, 0x79, 0x401}, &(0x7f0000000700)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000740)={r2, 0x7, 0x30}, 0xc) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000780)="c0141abd765a17416e947d20ea9b3405a0d718e81f9560dd99620ca83a36e50935e22c3b68fc3825f11cbff3e37279053b34119c413bbbcbad8948348cd6e35bfa6b6f157ae842765cd1c5f38dd18b98a6053d9194446837c797c30a5e1218e13bf607d0b42ecb2b2e563c20f51daf0da179c79a6897720916d189fb0763c5e7ecb8779ca95846b750266f7648fb1d464de4f0524392150f58849cb5ff7edbee", 0xa0) syz_open_dev$rtc(&(0x7f0000000840)='/dev/rtc#\x00', 0xb37, 0x200) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000880)={0xfffffffffffffff7}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f00000008c0)=[{}, {}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) pipe2(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000a40)={@any=0xffffffff}) clock_adjtime(0x6, &(0x7f0000000a80)={0x1, 0x9, 0x7, 0x3, 0x0, 0x62f2ec, 0x7fffffff, 0xffffffffffffff27, 0x2, 0xfffffffffffffffb, 0x9, 0x1, 0x8, 0xb0aa, 0xaa5f, 0x7f, 0x81b, 0x2, 0x6, 0x1, 0x400, 0xa0, 0x7, 0x2a, 0x1, 0x8001}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000b80)={0x9e7, 0x9, 0x0, 0xfffffffffffffffe, 0x2, 0x7ff, 0x6b7, 0x5, r3}, 0x20) ioctl$KIOCSOUND(r5, 0x4b2f, 0x40) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000bc0)={'ip6tnl0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockname(r4, &(0x7f0000000c00)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000c80)=0x80) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vcs\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000d00)={r2, 0x2}, 0x8) sendto$llc(r5, &(0x7f0000000d40)="9553ab502df0f7a3edc89c93143cf903dc0e8308a9c233683133b45d8e71227570f0327809324eed914c1a8a39b51897d0e7abe52fec942e195961877059ab", 0x3f, 0x400c010, 0x0, 0x0) bind$nfc_llcp(r0, &(0x7f0000000d80)={0x27, 0x1, 0x2, 0x5, 0x100000001, 0x3, "c5eac2cc6a32f801a1676d33a4340ec5b0c9daf565e85c0b60adeffe5dfc7cf678ce1a76924f46a1eb805735a2d99313c01718404d6ca8b52c702c2da29ded"}, 0x60) [ 186.377161] loop0: AHDI p2 p4 [ 186.386657] loop0: p2 start 2020327233 is beyond EOD, truncated [ 186.416605] FAULT_INJECTION: forcing a failure. [ 186.416605] name failslab, interval 1, probability 0, space 0, times 0 [ 186.427970] CPU: 1 PID: 13070 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 186.436385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.445745] Call Trace: [ 186.448349] dump_stack+0x1c9/0x2b4 [ 186.452005] ? dump_stack_print_info.cold.2+0x52/0x52 [ 186.457222] ? __kernel_text_address+0xd/0x40 [ 186.461734] ? unwind_get_return_address+0x61/0xa0 [ 186.466682] should_fail.cold.4+0xa/0x11 [ 186.470759] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 186.475856] ? save_stack+0xa9/0xd0 [ 186.479493] ? save_stack+0x43/0xd0 [ 186.483107] ? kasan_kmalloc+0xc4/0xe0 [ 186.486985] ? kmem_cache_alloc_trace+0x152/0x780 [ 186.491817] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 186.496992] ? __list_lru_init+0x4d6/0x840 [ 186.501216] ? alloc_super+0x9a6/0xb10 [ 186.505092] ? vfs_get_super+0x6e/0x270 [ 186.509053] ? proc_get_tree+0x88/0xb0 [ 186.512924] ? vfs_get_tree+0x1cb/0x5c0 [ 186.516885] ? do_mount+0x6c1/0x1fb0 [ 186.520606] ? ksys_mount+0x12d/0x140 [ 186.524397] ? __x64_sys_mount+0xbe/0x150 [ 186.528535] ? do_syscall_64+0x1b9/0x820 [ 186.532582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.537936] ? save_stack+0xa9/0xd0 [ 186.541554] ? lock_acquire+0x1e4/0x540 [ 186.545513] ? fs_reclaim_acquire+0x20/0x20 [ 186.549821] ? lock_downgrade+0x8f0/0x8f0 [ 186.553954] ? __x64_sys_mount+0xbe/0x150 [ 186.558093] ? check_same_owner+0x340/0x340 [ 186.562400] ? rcu_note_context_switch+0x730/0x730 [ 186.567320] __should_failslab+0x124/0x180 [ 186.571546] should_failslab+0x9/0x14 [ 186.575333] kmem_cache_alloc_trace+0x2cb/0x780 [ 186.579992] ? kasan_kmalloc+0xc4/0xe0 [ 186.583874] __memcg_init_list_lru_node+0x185/0x2d0 [ 186.588880] ? kvfree_rcu+0x20/0x20 [ 186.592493] ? __kmalloc_node+0x47/0x70 [ 186.596485] __list_lru_init+0x4d6/0x840 [ 186.600535] ? list_lru_destroy+0x500/0x500 [ 186.604862] ? prealloc_shrinker+0x213/0x480 [ 186.609256] ? __init_waitqueue_head+0x9e/0x150 [ 186.613911] ? inactive_list_is_low+0x850/0x850 [ 186.618572] ? __lockdep_init_map+0x105/0x590 [ 186.623055] alloc_super+0x9a6/0xb10 [ 186.626761] ? destroy_unused_super.part.11+0x110/0x110 [ 186.632115] ? lock_downgrade+0x8f0/0x8f0 [ 186.636253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.640996] ? kasan_check_read+0x11/0x20 [ 186.645154] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 186.649727] ? ns_test_super+0x50/0x50 [ 186.653599] sget_fc+0x269/0x950 [ 186.656953] ? compare_single+0x10/0x10 [ 186.660915] ? alloc_super+0xb10/0xb10 [ 186.664793] ? kasan_kmalloc+0xc4/0xe0 [ 186.669438] ? __kmalloc_track_caller+0x311/0x760 [ 186.674271] ? proc_root_lookup+0x60/0x60 [ 186.678403] vfs_get_super+0x6e/0x270 [ 186.682200] proc_get_tree+0x88/0xb0 [ 186.685902] vfs_get_tree+0x1cb/0x5c0 [ 186.689690] do_mount+0x6c1/0x1fb0 [ 186.693219] ? check_same_owner+0x340/0x340 [ 186.697529] ? lock_release+0xa30/0xa30 [ 186.701490] ? copy_mount_string+0x40/0x40 [ 186.705715] ? kasan_kmalloc+0xc4/0xe0 [ 186.709591] ? kmem_cache_alloc_trace+0x318/0x780 [ 186.714426] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.719951] ? _copy_from_user+0xdf/0x150 [ 186.724088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.729615] ? copy_mount_options+0x285/0x380 [ 186.734098] ksys_mount+0x12d/0x140 [ 186.737713] __x64_sys_mount+0xbe/0x150 [ 186.741674] do_syscall_64+0x1b9/0x820 [ 186.745547] ? finish_task_switch+0x1d3/0x870 [ 186.750030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 186.754955] ? syscall_return_slowpath+0x31d/0x5e0 [ 186.759871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 186.764875] ? prepare_exit_to_usermode+0x291/0x3b0 [ 186.769880] ? perf_trace_sys_enter+0xb10/0xb10 [ 186.774539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 186.779372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.784547] RIP: 0033:0x455ab9 [ 186.787717] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.806895] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 186.814593] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 186.821847] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 15:48:08 executing program 4 (fault-call:11 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 186.829103] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 186.836365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 186.843623] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001b [ 186.867181] loop0: AHDI p2 p4 15:48:08 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0xffffffffffffffff, 0x800000000000000, 0x6, 0x0, 0x0, 0x0, 0xd3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 15:48:08 executing program 0: syz_read_part_table(0x900000000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 186.884210] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:08 executing program 2: r0 = socket$nl_generic(0xa, 0x5, 0x84) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffff, 0x4000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000180)=""/237, 0x1000, 0x800, 0x7ff}, 0x18) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x12, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}}) 15:48:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x34, 0x3ffffd) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x20000000c0385720, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) 15:48:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:08 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2202, 0x0) [ 187.091722] FAULT_INJECTION: forcing a failure. [ 187.091722] name failslab, interval 1, probability 0, space 0, times 0 [ 187.103177] CPU: 0 PID: 13103 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 187.111595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.120963] Call Trace: [ 187.123562] dump_stack+0x1c9/0x2b4 [ 187.127211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 187.132407] ? __kernel_text_address+0xd/0x40 [ 187.136896] ? unwind_get_return_address+0x61/0xa0 [ 187.141833] should_fail.cold.4+0xa/0x11 [ 187.145891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.150986] ? save_stack+0xa9/0xd0 [ 187.154599] ? save_stack+0x43/0xd0 [ 187.158222] ? kasan_kmalloc+0xc4/0xe0 [ 187.162123] ? kmem_cache_alloc_trace+0x152/0x780 [ 187.166958] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 187.172140] ? __list_lru_init+0x4d6/0x840 [ 187.176359] ? alloc_super+0x9a6/0xb10 [ 187.180231] ? vfs_get_super+0x6e/0x270 [ 187.184191] ? proc_get_tree+0x88/0xb0 [ 187.188080] ? vfs_get_tree+0x1cb/0x5c0 [ 187.192050] ? do_mount+0x6c1/0x1fb0 [ 187.195758] ? ksys_mount+0x12d/0x140 [ 187.199548] ? __x64_sys_mount+0xbe/0x150 [ 187.203695] ? do_syscall_64+0x1b9/0x820 [ 187.207743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.213109] ? save_stack+0xa9/0xd0 [ 187.216731] ? lock_acquire+0x1e4/0x540 [ 187.220691] ? fs_reclaim_acquire+0x20/0x20 [ 187.224998] ? lock_downgrade+0x8f0/0x8f0 [ 187.229154] ? __x64_sys_mount+0xbe/0x150 [ 187.233289] ? check_same_owner+0x340/0x340 [ 187.237598] ? rcu_note_context_switch+0x730/0x730 15:48:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000"], 0x68) 15:48:08 executing program 6: syz_read_part_table(0x4, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951dce68a154e99e4213eac4fe6681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5", 0xffffffffffffff3f, 0xfe}]) [ 187.242530] __should_failslab+0x124/0x180 [ 187.246776] should_failslab+0x9/0x14 [ 187.250581] kmem_cache_alloc_trace+0x2cb/0x780 [ 187.255253] ? kasan_kmalloc+0xc4/0xe0 [ 187.259129] __memcg_init_list_lru_node+0x185/0x2d0 [ 187.264142] ? kvfree_rcu+0x20/0x20 [ 187.267755] ? __kmalloc_node+0x47/0x70 [ 187.271714] __list_lru_init+0x4d6/0x840 [ 187.275762] ? list_lru_destroy+0x500/0x500 [ 187.280078] ? prealloc_shrinker+0x213/0x480 [ 187.284474] ? __init_waitqueue_head+0x9e/0x150 [ 187.289130] ? inactive_list_is_low+0x850/0x850 [ 187.293785] ? __lockdep_init_map+0x105/0x590 [ 187.298265] alloc_super+0x9a6/0xb10 [ 187.301970] ? destroy_unused_super.part.11+0x110/0x110 [ 187.307318] ? lock_downgrade+0x8f0/0x8f0 [ 187.311451] ? kasan_check_read+0x11/0x20 [ 187.315584] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 187.320154] ? kasan_check_write+0x14/0x20 [ 187.324370] ? do_raw_spin_lock+0xc1/0x200 [ 187.328593] ? ns_test_super+0x50/0x50 [ 187.332480] sget_fc+0x269/0x950 [ 187.335838] ? compare_single+0x10/0x10 [ 187.339803] ? alloc_super+0xb10/0xb10 [ 187.343676] ? kasan_kmalloc+0xc4/0xe0 [ 187.347549] ? __kmalloc_track_caller+0x311/0x760 [ 187.352376] ? proc_root_lookup+0x60/0x60 [ 187.356532] vfs_get_super+0x6e/0x270 [ 187.360325] proc_get_tree+0x88/0xb0 [ 187.364030] vfs_get_tree+0x1cb/0x5c0 [ 187.367818] do_mount+0x6c1/0x1fb0 [ 187.371342] ? kasan_check_write+0x14/0x20 [ 187.375561] ? copy_mount_string+0x40/0x40 [ 187.379796] ? retint_kernel+0x10/0x10 [ 187.383675] ? copy_mount_options+0x1f0/0x380 [ 187.388154] ? copy_mount_options+0x1f6/0x380 [ 187.392634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.398154] ? copy_mount_options+0x285/0x380 [ 187.402651] ksys_mount+0x12d/0x140 [ 187.406275] __x64_sys_mount+0xbe/0x150 [ 187.410242] do_syscall_64+0x1b9/0x820 [ 187.414115] ? finish_task_switch+0x1d3/0x870 [ 187.418619] ? syscall_return_slowpath+0x5e0/0x5e0 [ 187.423534] ? syscall_return_slowpath+0x31d/0x5e0 [ 187.428446] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 187.433460] ? prepare_exit_to_usermode+0x291/0x3b0 [ 187.438469] ? perf_trace_sys_enter+0xb10/0xb10 [ 187.443121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.447954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.453125] RIP: 0033:0x455ab9 [ 187.456292] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.475423] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 187.483133] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 15:48:08 executing program 4 (fault-call:11 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:08 executing program 0: syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 187.490387] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 187.497641] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 187.504896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 187.512156] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001c [ 187.525160] loop0: AHDI p2 p4 [ 187.530229] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:08 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) r2 = msgget(0x2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/52) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000240)) ioctl$RTC_PIE_OFF(r1, 0x7006) recvmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000280)=""/15, 0xf}, {&(0x7f00000003c0)=""/84, 0x54}, {&(0x7f00000004c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/33, 0x21}, {&(0x7f0000000540)=""/135, 0x87}, {&(0x7f0000000600)=""/65, 0x41}, {&(0x7f0000000680)=""/153, 0x99}], 0x7, &(0x7f00000007c0)=""/4096, 0x1000, 0x8}, 0x3de536ca0aac155d) close(r0) 15:48:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4008ae06, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xf2, 0x40000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4, 0x3, 0xfff}) [ 187.797660] Dev loop3: unable to read RDB block 1 [ 187.802642] loop3: AHDI p2 p4 [ 187.805901] loop3: partition table partially beyond EOD, truncated [ 187.816594] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:09 executing program 0: syz_read_part_table(0xfdffffff, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 187.863201] Dev loop3: unable to read RDB block 1 [ 187.868347] loop3: AHDI p2 p4 [ 187.871639] loop3: partition table partially beyond EOD, truncated [ 187.885248] loop3: p2 start 2020327233 is beyond EOD, truncated [ 187.891594] loop0: AHDI p2 p4 [ 187.895443] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:09 executing program 3: syz_read_part_table(0x0, 0xc2, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}}, &(0x7f00000006c0)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000580)={r1, 0x20, &(0x7f00000005c0)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @multicast1=0xe0000001}]}, &(0x7f00000001c0)=0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000240)=0xc) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000480)) ioctl$sock_netdev_private(r0, 0x89f4, &(0x7f0000000380)="12a199b51876ca2d9df68443c1bb5680ba81507960e8d09b0b38b49760b524942bf76b2c7b335c75d8570d5f4331ed4fc65c85527d8bdd21cabf8d2dca338777043398ae472833b90e916957ce") syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@shortname_winnt='shortname=winnt', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES64=0x0, @ANYBLOB="6500002085619f4dc127ca234729033d590860a7d320898d99262b4d34b7fc02dce7ff8a52ae4ba2fcfc6015ea45db56fb9e108d0862704432dbff0fe70000000016fa96a0eb228ad63c5cbd56140a2aab705593abd6924dbe4ba54c8c584db6c60c321260b03a42e7728922efe5b042ff89be13f324fc0558b0b2981299b86e"], &(0x7f0000000340)=0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)=r3, 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000180)="bc34a0038ab3fb557444a54c2d290484", 0x10) socket$inet_smc(0x2b, 0x1, 0x0) [ 187.969991] FAULT_INJECTION: forcing a failure. [ 187.969991] name failslab, interval 1, probability 0, space 0, times 0 [ 187.981286] CPU: 1 PID: 13151 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 187.989695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.999056] Call Trace: [ 188.001661] dump_stack+0x1c9/0x2b4 [ 188.005304] ? dump_stack_print_info.cold.2+0x52/0x52 [ 188.010515] ? __kernel_text_address+0xd/0x40 [ 188.015031] ? unwind_get_return_address+0x61/0xa0 15:48:09 executing program 6: r0 = socket$inet6(0xa, 0x20000000000001, 0x0) ioctl(r0, 0x4000008915, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000040)) fcntl$notify(r1, 0x402, 0x10) write(r1, &(0x7f00000002c0)="7f2c9519995755b2616d7f5cde0835076812408529f78f48d90587dd3e4c97137633095cf683fcc8371b78603cc4a8006631cc9d7676a7d0282fe1fa5e8cbeb6df4f0bc0415b8d8fc1d4bf415938d28c7c38e94c02e19b94799f1c7caabe002a4d0cbb18fbbe6cbf6877a13b16aac2ff2ab43b3f745ce6b0ded6e0158279855ddfb0d7996e14e89ca1ed23ebafd937b178942204501bc5e4f9b434335c06e8bae43b0202d981ee51648a12c4b3ac1d8367754ab043bf6425e10a2fada81a64bbdc535bfeb87bc90aac97a78b29c9972c3ae1664717b1597acd9a7107d5572c5c9d4c77d5d8d51b5c63ca55f29b8e6f0765055ed12c8c5488d9ae46aafbee02e427f2bce2745110b18442ce499fcaf2a484857851f296a8562d947920503cf403a483029e2ed6ab159cb40e207eb50116e0c8d9f24fa8790e1c7aa32883e280404918f19b4206f683a9cd3d5aa335f350ec85a0aae886352af227c88ae9e52117f2fd2370ce1f48656ff040116bf34810db6183f847fcffa7f6c87b9e82682d9d078669236b4e535fd031c1f3091aeb52b56c285677ef648facba75890482d06314f7236e502e76a459d11596696639ef78f4579146f872a6dd541a0f562fed3af2aad6762368fd3f8f3361912d208c10e471a365dc00c9b1de9d73beaa0be76086a0fbf4127ed34b652efb485f5146f96160054e46c1a5ab5eab5abed1688f1bf21e5155674a8de320fad3f63439806f851c56636fa4bfc8ef32c24abe996dce832a84fde6de62ee444b4953ff2ca55dcc7f8d3530e58597ab0d86906fad38647cee9d89fc04fd92ddc7bda2d7eb524c66639b5fae16ccd079001d73755a1c737d829e3a023e3996987284a7921eed8a2932834d685e68216af6ce7f5d0306be44e4bd7a7b43c536c26e28b8632b6894cfd324e099131f7c8eb22b207fc8d0cba2c12d69b1047e26636cfccfc1d60e4d9bfd432650ebc3f044754ec0546a9186fb330d5250b3b8da1e7f9030ba182e18ee2de94bd20918db157048e30bb37d6bc0bc0b127ac59c6a9f01882298e1bc60f4a9a54b10d762cd009962574e470c2a356363decf34130a3571700e6befecf6913dce9514cb706eee4fa87c1199f45cc3e01a0fdf38ae6b6097beeb1356c6a8afea719bae40592f89b6521faa2b8843a94454660a4c41e8610000211fdeb49d69dbc0ca15518dd7412372b891d9d07a3e234510b1bfc751124749bd3d68fea1f8f5d391d0aa94662b1192d5e48622910d2bd1b123137304d678164c345f19e6871dd70d22f551e2b06596ac9ae46bb2acc06f66e69096c849cc0dcf557318bd50436b15efe72f714d2cf6e5b5e3ee014abf6d1146995132e18486b9b39d7b6ce77f2c544f505aaea29a1e1399e8b6369e5851559a2668e90dd76351fef60633d8e8128301de544925158a8ca56945d0571817f579877cbb9f1530ccbe8737841e8cf5a9d742dbf05f5081c73e592adea067b3f2fd120bffa250e1d59c9da9d9ce6746f70fa8ea8c09d35568f6fbb74c49aadf8319828cbe5e84feb270f025eaa4ae929a27b0f7a094bcbfd28aaefaa6bcbb302714a335add1151aa6f1114956979587b5b47187b784d4920857aa3682cc7cf3ba6f3299d8b1746491028ae3ef109a610196a8ab1f125d0986f96dc396d524a6d41220882fa96d086e97ed30d21648201d7cb26110c8673f822972e6953fef7d6d54287dc7e4d2d48904a26d1733cd0cd670afbabb29af04e4bcba5cbf50a5f9a79814861c1dca52813e027c860ac238eb68b9a3f79c38f7e31acfc1a8f40551c4888004b8b621e44b63b4b6e1cd9b3e68e13c77c031edd584364f0e32b72bde465c901cfa70f0803ce06d71190c89b286fb16ee2070ea33ec8919096995d979c0bcac13898e91f5ee4ab35babf5eef6ef5b7c4f8c58c0dc4dfa7c1a5a4e078d62cf3aba2d1204cb2bc176a48be48b5045f3841224fd7a912b3fe66e0d37b1a466ed62dce74e42c0a65f1d53e56d3d18a1fac962228f04940ebd8bcd8d3365006b4ed8910d20137e2865ad0b2d7195eebc259ff7c9531b26994868676ff55b58d2dc4404745712257dea2814de8b12804e18e88fa9d877a8b91026347a43047f30e9e4b3903440fb3944d6a1e3dc27b31b9de9f73782b476ed66aab4284779291f7cff81ecc4a9084d56328c12eb601b41abb7f252e5ac079a2f52b500a03bad8401326f5844b7a78922b1bcf6b2e4802d96b63ebe948e031a2496a310715ddf4cad6400fbf8d43c32e38f4de152a75c7b9f11f5389f181e9b578f83b2c40de47077d737eea1888c9ad5310138e644b165a4ab2b1a7d94cb0a84ec5545f3987d4d57fe84b474de502dc9e8bf3c747da9b40fd8efe5bba4abb7a116699c904cc132248787c0a78db704fee375723cc600281c467925c9e0e509d66054c7e8a2bd025f5b4cc9de6ec218ab92bffe047d110c4364fc8849ea1b7c2820abe05b7fccf081b1c1411e3d09aa43f3154515a40516d99503c6ee3dc7f5a6076c760782fbc53c2519a0a58b220eda967dca706797a6d2dd0f4a54042b31c03dc8cc0269ce6f6a297ed625ba360b3d9c69e8cead111d33bcee9908499b63437e710d9bab8c18421cd35c89e710421ca11daed3aa494706505b9c34f0b75601a53841e7a46ce4fca4caab5a8464824f0d70514d0276c5adee9768db770dc3eae364b964c58a0df5c0a69c0afed1ac77f60561cfa61f7864451ff49fa8cbd947d2525515ee3d656023627d77b192f66afcc25f8b863c1cae7313df8083dab181193dc479c928cf63d6738c2a950ba7807beb385239e7b187717f4a43709901fe199ff6b0a9e4ff6e204c4acb09917a9a7b06181e7420c7b9e3d45045b24bc635118149aa161053ee6aa223d96d662ca2b134de0cf63e216433ef6cbccb256b7742057326c83a74ead651675c7981165ad41c53df82b7e657fad2574ecd7346317117adec4ddefb01e74d22d90382df3ae4624d344ec729013954561000d576ecd1c96427fdc9c546873d1f453c3d0e898eb723a102e6179beef6b058611e93d4040e118dfb8677f81c47dc2082002f74a6d9169de4f220c4347f3a2b0d19f5431b0776beaef3ccdc644018c8dcdaae6994b4a5fd716adc77555b0195964ce985eeaf866c6ff6b3f4e661b5680c1eafe3825224082a2fcd7b8ff1f120f69f8f93d5c1dfd1cf873faf0b26f328949d63eabe551473595df3d75e0607ef76c0329104189764dfa6454e41a37bddfdb74aaaab83bd0faa3f2c9a68906c03bf763d8cf6791d80caf89e7db1fcceda7fe4d0fd36400af037d47dd8e65e9b5178f6a93705b577d2ac733897183bf0945777b73a47b62d52f263b79004ae3b60a0f828e7a65b6ad03014034f1bdaf9e2330eaf0d699b3accbfa39ba255d19223706efd4b515bb98d6f7151401ac51c6a8e6d5b303eecddbf9e18ba34e6b54f25bce643aee6b375c229fc353d989008223c50359760c9da2108f5f91d370074088033dc53a1d69b49695666804101b686fa189bf7f63ffd89e235a4a28c4f3d2d75d00893473cb6e99238248d212bfbf0f1a2178698369085f047eb85cfffc59bf36de5353d146b02b1bfbe173adb7db9816c2a2f5363a31ea1fc54b8622123ffb8ae3863e76ffd87377aa2030ef4bb010f66f7b8782fcc56687b7f10fcfb403e7481e2ea9c2df1b3d436439d243129a4e2f290253e1dd4ebf3732d1c6b6881a2df1eacc9bb90614362465222332888a8c6cd9bda1c8467600f5278373e8797c5079e86f112ddc20206338d72f4bc2e0ca587c8d267a53a3c4456c94b137113e9ded59fcd48ecd92b9d9a19a181088f53a79b20281133e8c48952fe6e91efa008f7b23c0660c4f1d7eacd3c805b5745b1458fbc6a0bc4789e3081f15577f25a18a48eeda00608ccf8105a2dc0e9686fc02da545ae6c5ed99bdbb2fd590d5c57090ae7e5328d0ff53f78bd244fc5e7c8a276a2d779eae211dd6c8d3614723c7114056bf219dfdacf121554f13a1a1789301d6791bbb50c7728b604f631f4ff15b2a19ff9cc7a57009bdda82b8b36ef24d4dcd86ca040b0a14a11c80ea1a42c21a0651584943dd582b39138c26ebfe7467e592ac8584d789f0c828fe0bbb39f2c471f0359925439053159adcf2a340d6216a9d89bbd321dcdfad7840c74d18f0da6024fbecd88df77e6af7dede28703056b61960fe684753ecb8e552a1e50bd692f4cd083c7837b0419d88da219498bd1d417a7c0a6a29a91b17a866f9152ee7bb61f43db0dc5c451e81081c20b1b935ce98500be2c8ce3c76b11ca8e1376398e2ba671542b61e220029710f095ea167f93593f7e46fc6830fd3571da5c4f3af049d552f57850852c7b33d30e781529c26b2da163e858dd63b247b9f67d895744ff0026fad9f76cf50a61db92175df0f00755b82592030bdcf1e3c82dfa8afc8b1842c10ea9b4abb3520acfdf487d21e5a20d9044d8f8e0f423b0e6f12490e3e7fe2d928eb0c74bffd7862592eeb06ea13cad16bcd2c220906eacd9bdcb26744bd7988cc238ea23d1a2311a2231a6fb34f0999374fceb5ccb6b5add99594b08a6e5890e60ca76e5b9a111e1775d47d86630fce7ab9f4ceadb136b51c5e1a1e051d8729e99d383659d97e408f9644d80fa213de71643b2ff01963ed9ccd57c2f7d3bbe24cd0718650e64052a6c101c058c36c7c799655e4aa6aa55967f81848b1e76469645df0aee401bcb71f236b495ec36d891bc003dc8245cfc2528866a704166fa1a4169f125d6740c757ae0e5f91772a545d46737d107d1bd5e34a074b4f9faef3aebb3a1f94a55ae0718f3e2539e02ba193af88cc68820df41e35284ee36eb0effa924b3c7f30978a1200b3c1a140566bf4e44bc3f73b6dc7c5687eec52142dba7e33629c3bb6d17d864f4bb4a4927af042d02e98b6ee36a40bcc65dc89b99051d28b2d26d105ca41d4b59419187000f5166ad4316f23c30f19c2afd741f8534567affd9521c35c13b7bf9ee04f7fbb00d5bccf0515f741cf07dcaf35b26fd70fbb59f222ae6b0142bbb53d9829adfd1cd0a527c56309db93049bcce8535d8064a8f1ce063637e38f7b0c80d555f361e063de87a9b9fbba13a0344242f4c0b79b39f82c58fb034ddbe30441ac759c667b846cd4cb890e73e9b88f0197425bee3f971364957d39fe2adf41fb6f347533a6e80e71bd2f780c78963682ed29c7354b0918b7eb841bcf3eebaf97b475a638c71e80201167a3bc36f1eaa628119152b619846b0b149d5916e94b477decd76fa0039e74106b49f3644d2eff047638ce8bdade2ad9cde78b24a8939e8436ba92a4af62093c691c0439542dc3c2890b5939e012ef843ed7961c3df4c999eb0cd9cf0283c206ac1c90e7e07a26e39db8f87734646efc1f3918f3e2124c5274cc090e5f8a0fced96418ead85075c806723ed3198813836f8427f318e909534b631c0b2eadb07bc76cfd0fdd851a95f2ed1d4b8d9c04d173383c39b9f50c41f518af390f65182c625ee0da993ad73970317ea35bf5f335b1d9511abaca5f6a5aaec867d5ed080f0022835612f78aad56a8de9804d8bd55bedc2f1b9c018fd1a08740511b0ce53a2143de11b742469bdae547dcddad927d78a86b03d4f04a47af3bf5affc9cf17b7820633c60f086871d9bcb1e5b3dbe08c5b63a74e37b4428e4a1da523b539a836bcbeba969d0d281e2e79a8d46fa9e886d0096264a17ff6502df774e1e2bd6d6cf9c9f6b84bcd12bae08b74802751ffdbd8", 0x1000) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x6}, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000200)={'sit0\x00', 0xa80}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x80}, 0x8) sendto$inet(r1, &(0x7f00000003c0), 0x53ab, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) [ 188.019975] should_fail.cold.4+0xa/0x11 [ 188.024055] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.029177] ? save_stack+0xa9/0xd0 [ 188.032818] ? save_stack+0x43/0xd0 [ 188.036460] ? kasan_kmalloc+0xc4/0xe0 [ 188.040361] ? kmem_cache_alloc_trace+0x152/0x780 [ 188.045218] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 188.050426] ? __list_lru_init+0x4d6/0x840 [ 188.054677] ? alloc_super+0x9a6/0xb10 [ 188.058588] ? vfs_get_super+0x6e/0x270 [ 188.062578] ? proc_get_tree+0x88/0xb0 [ 188.066480] ? vfs_get_tree+0x1cb/0x5c0 15:48:09 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000000c0)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@loopback=0x7f000001, @rand_addr=0x200, 0x1, 0x8, [@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, @broadcast=0xffffffff, @rand_addr=0x8001, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x466f, @multicast2=0xe0000002]}, 0x30) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7002, &(0x7f0000000040)) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1bde6904, 0x2301) [ 188.070467] ? do_mount+0x6c1/0x1fb0 [ 188.074194] ? ksys_mount+0x12d/0x140 [ 188.078008] ? __x64_sys_mount+0xbe/0x150 [ 188.082175] ? do_syscall_64+0x1b9/0x820 [ 188.086249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.091627] ? save_stack+0xa9/0xd0 [ 188.095270] ? lock_acquire+0x1e4/0x540 [ 188.099253] ? fs_reclaim_acquire+0x20/0x20 [ 188.103577] ? lock_downgrade+0x8f0/0x8f0 [ 188.107715] ? __x64_sys_mount+0xbe/0x150 [ 188.111866] ? check_same_owner+0x340/0x340 [ 188.116187] ? rcu_note_context_switch+0x730/0x730 [ 188.121117] __should_failslab+0x124/0x180 [ 188.125361] should_failslab+0x9/0x14 [ 188.129177] kmem_cache_alloc_trace+0x2cb/0x780 [ 188.133860] ? kasan_kmalloc+0xc4/0xe0 [ 188.137760] __memcg_init_list_lru_node+0x185/0x2d0 [ 188.142786] ? kvfree_rcu+0x20/0x20 [ 188.146426] ? __kmalloc_node+0x47/0x70 [ 188.150417] __list_lru_init+0x4d6/0x840 [ 188.154495] ? list_lru_destroy+0x500/0x500 [ 188.158829] ? prealloc_shrinker+0x213/0x480 [ 188.163249] ? __init_waitqueue_head+0x9e/0x150 [ 188.167934] ? inactive_list_is_low+0x850/0x850 [ 188.172620] ? __lockdep_init_map+0x105/0x590 [ 188.177137] alloc_super+0x9a6/0xb10 [ 188.180852] ? destroy_unused_super.part.11+0x110/0x110 [ 188.186215] ? lock_downgrade+0x8f0/0x8f0 [ 188.190364] ? kasan_check_read+0x11/0x20 [ 188.194507] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 188.199081] ? kasan_check_write+0x14/0x20 [ 188.203316] ? do_raw_spin_lock+0xc1/0x200 [ 188.207544] ? ns_test_super+0x50/0x50 [ 188.211421] sget_fc+0x269/0x950 [ 188.214775] ? compare_single+0x10/0x10 [ 188.218741] ? alloc_super+0xb10/0xb10 [ 188.222625] ? kasan_kmalloc+0xc4/0xe0 [ 188.226512] ? __kmalloc_track_caller+0x311/0x760 [ 188.231351] ? proc_root_lookup+0x60/0x60 [ 188.235490] vfs_get_super+0x6e/0x270 [ 188.239284] proc_get_tree+0x88/0xb0 [ 188.242988] vfs_get_tree+0x1cb/0x5c0 [ 188.246786] do_mount+0x6c1/0x1fb0 [ 188.250317] ? kasan_check_write+0x14/0x20 [ 188.254543] ? copy_mount_string+0x40/0x40 [ 188.258768] ? kasan_kmalloc+0xc4/0xe0 [ 188.262652] ? kmem_cache_alloc_trace+0x318/0x780 [ 188.267487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 188.273025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.278554] ? copy_mount_options+0x285/0x380 [ 188.283044] ksys_mount+0x12d/0x140 [ 188.286665] __x64_sys_mount+0xbe/0x150 [ 188.290640] do_syscall_64+0x1b9/0x820 [ 188.294520] ? finish_task_switch+0x1d3/0x870 [ 188.299015] ? syscall_return_slowpath+0x5e0/0x5e0 [ 188.303937] ? syscall_return_slowpath+0x31d/0x5e0 [ 188.308881] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 188.313892] ? prepare_exit_to_usermode+0x291/0x3b0 [ 188.318900] ? perf_trace_sys_enter+0xb10/0xb10 [ 188.323561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.328401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.333580] RIP: 0033:0x455ab9 [ 188.336752] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.356062] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 188.363763] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 188.371023] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 188.378285] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 188.385543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 188.392800] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001d 15:48:09 executing program 4 (fault-call:11 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x39a5, 0x0, 0xaf8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x3ed5a3a8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$tun(r1, &(0x7f0000001200)={@val={0x0, 0x818}, @void, @eth={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@generic={0x8537102df68dba4d, "f29b1e95f31dc7330630b28021634ef96c8641d5cd9ad9700011153ba957538d41727ba7aa448dba1b514f9b9d51385f4253dd1488d6bcd2bad73a146d59350ab0f5ff6330a4bfcb67db47ee7a7baefc8c90cf1d3594d6a378d9dfc2cd526aeec5c11e6ccefe395b635462752a7d9dbaeb21e5d43217176161373c9e21bda50aa4e4ca5128dd50117c1110ec98179d6600a32e7563901508fca491284922d775a36f8e069904a1c1e0df55b881c5026ac81320de4f39"}}}}, 0xc8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="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", 0x1000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 188.420904] loop0: AHDI p2 p4 [ 188.425313] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:09 executing program 0: syz_read_part_table(0xf5ffffff, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x3ff, 0x1, 0x1e, 0x1}, 0x2c) close(r0) [ 188.465657] loop0: AHDI p2 p4 [ 188.469257] loop0: p2 start 2020327233 is beyond EOD, truncated [ 188.475578] Dev loop3: unable to read RDB block 1 [ 188.480517] loop3: AHDI p2 p4 [ 188.483744] loop3: partition table partially beyond EOD, truncated [ 188.501052] loop3: p2 start 2020327233 is beyond EOD, truncated [ 188.556695] FAT-fs (loop3): bogus number of reserved sectors [ 188.562699] FAT-fs (loop3): Can't find a valid FAT filesystem 15:48:09 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000052c0)='/dev/sequencer\x00', 0x402, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000005300)={0x0, 0x6}, &(0x7f0000005340)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000005380)={r1, @in6={{0xa, 0x4e24, 0x9788920, @remote={0xfe, 0x80, [], 0xbb}, 0x859e}}}, 0x84) 15:48:09 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000"], 0x68) 15:48:09 executing program 5: r0 = socket$inet6(0xa, 0x80000, 0x1000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x10040) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000080)=0x3ff, 0x4) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000a0a07031dfffd946fa2830020200a0009000200021d85680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000000c0)) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000000)=@generic={0x3, 0x7, 0x1}) 15:48:09 executing program 6: getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="737973678956ae0ece0e582f6e796c6c26"], &(0x7f0000000100), 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) io_setup(0x25c31dc2, &(0x7f0000000040)) prctl$intptr(0x1f, 0x1000000002) [ 188.705672] loop0: AHDI p2 p4 [ 188.709451] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xafa, 0x418000) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000140)={0x2, 0x0, [{}, {}]}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200800, 0x0) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 188.754992] loop0: AHDI p2 p4 [ 188.760259] loop0: p2 start 2020327233 is beyond EOD, truncated [ 188.774672] FAULT_INJECTION: forcing a failure. [ 188.774672] name failslab, interval 1, probability 0, space 0, times 0 [ 188.786023] CPU: 0 PID: 13214 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 188.794430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.803817] Call Trace: [ 188.806394] dump_stack+0x1c9/0x2b4 [ 188.810022] ? dump_stack_print_info.cold.2+0x52/0x52 [ 188.815222] ? __kernel_text_address+0xd/0x40 [ 188.819721] ? unwind_get_return_address+0x61/0xa0 [ 188.824659] should_fail.cold.4+0xa/0x11 [ 188.828730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.833844] ? save_stack+0xa9/0xd0 [ 188.837818] ? save_stack+0x43/0xd0 [ 188.841427] ? kasan_kmalloc+0xc4/0xe0 [ 188.845294] ? kmem_cache_alloc_trace+0x152/0x780 [ 188.850118] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 188.855288] ? __list_lru_init+0x4d6/0x840 [ 188.859506] ? alloc_super+0x9a6/0xb10 [ 188.863375] ? vfs_get_super+0x6e/0x270 [ 188.867329] ? proc_get_tree+0x88/0xb0 [ 188.871208] ? vfs_get_tree+0x1cb/0x5c0 [ 188.875175] ? do_mount+0x6c1/0x1fb0 [ 188.878879] ? ksys_mount+0x12d/0x140 [ 188.882663] ? __x64_sys_mount+0xbe/0x150 [ 188.886801] ? do_syscall_64+0x1b9/0x820 [ 188.890844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.896189] ? save_stack+0xa9/0xd0 [ 188.899815] ? lock_acquire+0x1e4/0x540 15:48:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0xcb490213a3b032a9, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x20) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x6, 0x3, 0x4fa}, 0x10) 15:48:10 executing program 0: syz_read_part_table(0x7000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 188.903772] ? fs_reclaim_acquire+0x20/0x20 [ 188.908075] ? lock_downgrade+0x8f0/0x8f0 [ 188.912215] ? __x64_sys_mount+0xbe/0x150 [ 188.916355] ? check_same_owner+0x340/0x340 [ 188.920690] ? rcu_note_context_switch+0x730/0x730 [ 188.925620] __should_failslab+0x124/0x180 [ 188.929857] should_failslab+0x9/0x14 [ 188.933672] kmem_cache_alloc_trace+0x2cb/0x780 [ 188.938331] ? kasan_kmalloc+0xc4/0xe0 [ 188.942206] __memcg_init_list_lru_node+0x185/0x2d0 [ 188.947204] ? kvfree_rcu+0x20/0x20 [ 188.950809] ? __kmalloc_node+0x47/0x70 [ 188.954765] __list_lru_init+0x4d6/0x840 [ 188.958810] ? list_lru_destroy+0x500/0x500 [ 188.963130] ? prealloc_shrinker+0x213/0x480 [ 188.967535] ? __init_waitqueue_head+0x9e/0x150 [ 188.972194] ? inactive_list_is_low+0x850/0x850 [ 188.976858] ? __lockdep_init_map+0x105/0x590 [ 188.981338] alloc_super+0x9a6/0xb10 [ 188.985041] ? destroy_unused_super.part.11+0x110/0x110 [ 188.990386] ? lock_downgrade+0x8f0/0x8f0 [ 188.994516] ? kasan_check_read+0x11/0x20 [ 188.998650] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 189.003220] ? kasan_check_write+0x14/0x20 [ 189.007435] ? do_raw_spin_lock+0xc1/0x200 [ 189.011654] ? ns_test_super+0x50/0x50 [ 189.015520] sget_fc+0x269/0x950 [ 189.018867] ? compare_single+0x10/0x10 [ 189.022821] ? alloc_super+0xb10/0xb10 [ 189.026694] ? kasan_kmalloc+0xc4/0xe0 [ 189.030574] ? __kmalloc_track_caller+0x311/0x760 [ 189.035407] ? proc_root_lookup+0x60/0x60 [ 189.039546] vfs_get_super+0x6e/0x270 [ 189.043329] proc_get_tree+0x88/0xb0 [ 189.047032] vfs_get_tree+0x1cb/0x5c0 [ 189.050821] do_mount+0x6c1/0x1fb0 [ 189.054341] ? kasan_check_read+0x11/0x20 [ 189.058468] ? do_raw_spin_unlock+0xa7/0x2f0 [ 189.062856] ? copy_mount_string+0x40/0x40 [ 189.067081] ? retint_kernel+0x10/0x10 [ 189.070948] ? copy_mount_options+0x1f0/0x380 [ 189.075425] ? copy_mount_options+0x202/0x380 [ 189.079910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.085433] ? copy_mount_options+0x285/0x380 [ 189.089909] ksys_mount+0x12d/0x140 [ 189.093518] __x64_sys_mount+0xbe/0x150 [ 189.097476] do_syscall_64+0x1b9/0x820 [ 189.101342] ? finish_task_switch+0x1d3/0x870 [ 189.105817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 189.110741] ? syscall_return_slowpath+0x31d/0x5e0 [ 189.115653] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 189.120651] ? prepare_exit_to_usermode+0x291/0x3b0 [ 189.125652] ? perf_trace_sys_enter+0xb10/0xb10 [ 189.130314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.135151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.140324] RIP: 0033:0x455ab9 15:48:10 executing program 4 (fault-call:11 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 189.143493] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.162627] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.170321] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 189.177587] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 189.184846] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 189.192121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 189.199396] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001e 15:48:10 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000802, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) [ 189.246921] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 189.264207] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 189.286434] Dev loop3: unable to read RDB block 1 [ 189.291379] loop3: AHDI p2 p4 [ 189.294609] loop3: partition table partially beyond EOD, truncated [ 189.301263] loop3: p2 start 2020327233 is beyond EOD, truncated [ 189.329302] Dev loop3: unable to read RDB block 1 [ 189.334277] loop3: AHDI p2 p4 [ 189.337497] loop3: partition table partially beyond EOD, truncated 15:48:10 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101000, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x11f, 0x0, 0x1000, 0x7, 0x80, @random="17dcd0b3becd"}, 0x10) [ 189.345099] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:10 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1, 0x8000) getuid() ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000debff0)={0x0, 0xffffffff00000008, &(0x7f000082f000)}) 15:48:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000180)={r3}) r4 = dup(r3) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) r6 = request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)='\\md5sumkeyringvboxnet1cgroup\x00', 0xfffffffffffffffa) r7 = add_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)="c84354fe1174dd882670ddc70543e945de644c12dcf407fd4a75034197ba229ddbd96a328ee86ac74740369148785137fc1f02f24ce42586d9035c99f50cf302a40e8008c8a2563a3e5f93e3c34f71facc8dc6c9fe9af3ed6e6d5a401c1d951c42cffbc3d650242737afcd799418aaf6e83e03eb7290edb6b25cc1f73dbbaac85626e2fac86de85cd55e9bf4a5365fc7694722fe00707dca83cab4adb99864ae8a3a98f7f098248842eec6e0a5", 0xad, 0x0) keyctl$search(0xa, r6, &(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, r7) sendfile(r2, r5, &(0x7f0000d83ff8)=0x1, 0x6) 15:48:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dos1xfloppy,uid=,debug,errors=remount-ro,debug,s\x00owexec,discard,check=strict']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x4004, 0x0) rename(&(0x7f0000000040)="2e2f66696c65302f2e696c2e2efe00", &(0x7f0000000140)="2e2f66696c65302f2e696c2e2efe00") 15:48:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x111000, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000200)=0x54) r2 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x3, 0x40) ptrace$peek(0x3, r0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000380)={0x1, 0x1, 'client1\x00', 0xffffffff80000002, "e773a0826f4f96fc", "b31f4e07358370b203c3b6eae0b33b1b9e0f33050cc73430ce3d7219dce4ccb0", 0x5, 0x4}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mount$9p_virtio(&(0x7f0000000280)='/dev/kvm\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000340)={'trans=virtio,', {[{@loose='loose', 0x2c}, {@fscache='fscache', 0x2c}, {@version_9p2000='version=9p2000', 0x2c}]}}) [ 189.514955] loop0: AHDI p2 p4 [ 189.521425] loop0: p2 start 2020327233 is beyond EOD, truncated [ 189.550435] Dev loop3: unable to read RDB block 1 [ 189.555368] loop3: AHDI p2 p4 [ 189.558588] loop3: partition table partially beyond EOD, truncated [ 189.565237] loop3: p2 start 2020327233 is beyond EOD, truncated [ 189.568415] FAULT_INJECTION: forcing a failure. [ 189.568415] name failslab, interval 1, probability 0, space 0, times 0 [ 189.578343] loop0: AHDI p2 p4 [ 189.582602] CPU: 1 PID: 13266 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 189.587007] loop0: p2 start 2020327233 is beyond EOD, [ 189.594149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.594154] Call Trace: [ 189.594176] dump_stack+0x1c9/0x2b4 [ 189.594194] ? dump_stack_print_info.cold.2+0x52/0x52 [ 189.594214] ? __kernel_text_address+0xd/0x40 [ 189.594230] ? unwind_get_return_address+0x61/0xa0 [ 189.594248] should_fail.cold.4+0xa/0x11 [ 189.594265] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.594283] ? save_stack+0xa9/0xd0 [ 189.594298] ? save_stack+0x43/0xd0 [ 189.594312] ? kasan_kmalloc+0xc4/0xe0 [ 189.594326] ? kmem_cache_alloc_trace+0x152/0x780 [ 189.594338] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 189.594354] ? __list_lru_init+0x4d6/0x840 [ 189.599646] truncated [ 189.608956] ? alloc_super+0x9a6/0xb10 [ 189.608971] ? vfs_get_super+0x6e/0x270 [ 189.608989] ? proc_get_tree+0x88/0xb0 [ 189.678125] ? vfs_get_tree+0x1cb/0x5c0 [ 189.682099] ? do_mount+0x6c1/0x1fb0 [ 189.685796] ? ksys_mount+0x12d/0x140 [ 189.689578] ? __x64_sys_mount+0xbe/0x150 [ 189.693711] ? do_syscall_64+0x1b9/0x820 [ 189.697756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.703108] ? save_stack+0xa9/0xd0 [ 189.706719] ? lock_acquire+0x1e4/0x540 [ 189.710677] ? fs_reclaim_acquire+0x20/0x20 [ 189.714980] ? lock_downgrade+0x8f0/0x8f0 [ 189.719109] ? __x64_sys_mount+0xbe/0x150 [ 189.723241] ? check_same_owner+0x340/0x340 [ 189.727548] ? rcu_note_context_switch+0x730/0x730 [ 189.732461] __should_failslab+0x124/0x180 [ 189.736679] should_failslab+0x9/0x14 [ 189.740464] kmem_cache_alloc_trace+0x2cb/0x780 [ 189.745115] ? kasan_kmalloc+0xc4/0xe0 [ 189.748987] __memcg_init_list_lru_node+0x185/0x2d0 [ 189.753988] ? kvfree_rcu+0x20/0x20 [ 189.757600] ? __kmalloc_node+0x47/0x70 [ 189.761558] __list_lru_init+0x4d6/0x840 [ 189.765604] ? list_lru_destroy+0x500/0x500 [ 189.769921] ? prealloc_shrinker+0x213/0x480 [ 189.774310] ? __init_waitqueue_head+0x9e/0x150 [ 189.778963] ? inactive_list_is_low+0x850/0x850 [ 189.783618] ? __lockdep_init_map+0x105/0x590 [ 189.788107] alloc_super+0x9a6/0xb10 [ 189.791828] ? destroy_unused_super.part.11+0x110/0x110 [ 189.797173] ? lock_downgrade+0x8f0/0x8f0 [ 189.801308] ? kasan_check_read+0x11/0x20 [ 189.805443] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 189.810015] ? kasan_check_write+0x14/0x20 [ 189.814236] ? do_raw_spin_lock+0xc1/0x200 [ 189.818459] ? ns_test_super+0x50/0x50 [ 189.822349] sget_fc+0x269/0x950 [ 189.825717] ? compare_single+0x10/0x10 [ 189.829679] ? alloc_super+0xb10/0xb10 [ 189.833556] ? kasan_kmalloc+0xc4/0xe0 [ 189.837434] ? __kmalloc_track_caller+0x311/0x760 [ 189.842265] ? proc_root_lookup+0x60/0x60 [ 189.846404] vfs_get_super+0x6e/0x270 [ 189.850191] proc_get_tree+0x88/0xb0 [ 189.853893] vfs_get_tree+0x1cb/0x5c0 [ 189.857680] do_mount+0x6c1/0x1fb0 [ 189.861206] ? check_same_owner+0x340/0x340 [ 189.865517] ? lock_release+0xa30/0xa30 [ 189.869476] ? copy_mount_string+0x40/0x40 [ 189.873699] ? retint_kernel+0x10/0x10 [ 189.877589] ? copy_mount_options+0x1e3/0x380 [ 189.882072] ? copy_mount_options+0x1e3/0x380 [ 189.886558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.892081] ? copy_mount_options+0x285/0x380 [ 189.896563] ksys_mount+0x12d/0x140 [ 189.900180] __x64_sys_mount+0xbe/0x150 [ 189.904142] do_syscall_64+0x1b9/0x820 [ 189.908016] ? finish_task_switch+0x1d3/0x870 [ 189.912501] ? syscall_return_slowpath+0x5e0/0x5e0 [ 189.917419] ? syscall_return_slowpath+0x31d/0x5e0 [ 189.922336] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 189.927344] ? prepare_exit_to_usermode+0x291/0x3b0 [ 189.932348] ? perf_trace_sys_enter+0xb10/0xb10 [ 189.937006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.941873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.947052] RIP: 0033:0x455ab9 15:48:11 executing program 4 (fault-call:11 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:11 executing program 0: syz_read_part_table(0x55, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 189.950221] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.969397] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.977092] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 189.984348] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 189.991602] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 189.998858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 190.006111] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001f [ 190.049561] Dev loop3: unable to read RDB block 1 [ 190.054612] loop3: AHDI p2 p4 [ 190.057864] loop3: partition table partially beyond EOD, truncated [ 190.065237] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:11 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r3 = accept4$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000002980)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000003500)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003540)={0x0, @dev, @rand_addr}, &(0x7f0000003580)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000003600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003640)={0x0, @local, @local}, &(0x7f0000003680)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000037c0)={@local, @local, 0x0}, &(0x7f0000003800)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000003940)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003b80)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000003c80)={@loopback, 0x0}, &(0x7f0000003cc0)=0x14) sendto(r1, &(0x7f0000000440)="3e2e1d543dd8a6f5c2a82f3ed13239d1bb01b2b050c93b3fd6fca5ba281f09a89865951bd54262c2a775531f033c9f7935c008af", 0x34, 0x10, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x3, 0x4, {0xa, 0x4e21, 0xd0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003e00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000004240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8020000}, 0xc, &(0x7f0000004200)={&(0x7f0000003e40)={0x38c, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {0x3}, [{{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffff25c}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0xbc, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xff}}}]}}, {{0x8, 0x1, r11}, {0x124, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x2c, 0x4, [{0x100000000, 0x7, 0x0, 0x1b0}, {0x9, 0x100000001, 0x9, 0x7}, {0x2, 0x8, 0x80, 0x8}, {0x4, 0x8, 0x1, 0x6}, {0x8, 0x3, 0x7fff, 0x7}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x8000, 0x3f, 0x38c1, 0xbf4f}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x1c, 0x4, [{0x8, 0x2, 0x4, 0xb11}, {0x100000000, 0x9, 0xcad8, 0x1}, {0x5, 0x1, 0x13e0, 0x6}]}}}]}}, {{0x8, 0x1, r13}, {0xb8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x92e2}}, {0x8, 0x6, r15}}}]}}]}, 0x38c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)=0x7, 0x4) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000400)={0x4, &(0x7f0000000300)=[{}, {}, {}, {}]}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r16, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r16, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r16, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r16, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendto$inet6(r16, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) sendmmsg(r16, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000000000)=[{0x18, 0x11a, 0x1, '}'}], 0x18, 0x40}}], 0x1, 0x0) [ 190.151295] FAT-fs (loop5): Unrecognized mount option "uid=" or missing value [ 190.211412] Dev loop0: unable to read RDB block 1 [ 190.216434] loop0: AHDI p2 p4 [ 190.219675] loop0: partition table partially beyond EOD, truncated [ 190.229369] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:11 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff00000000000000000000000000000000000000"], 0x68) 15:48:11 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x2) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback}, &(0x7f0000000180)=0xc) bind$packet(r0, &(0x7f00000001c0)={0x11, 0xf6, r1, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101000, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x11f, 0x0, 0x1000, 0x7, 0x80, @random="17dcd0b3becd"}, 0x10) 15:48:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x4000) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000040)=""/133, &(0x7f0000000100)=""/229, &(0x7f00000002c0)=""/232, 0x15000}) r3 = syz_open_dev$sndtimer(&(0x7f0000022ff1)='/dev/snd/timer\x00', 0x0, 0x0) accept$packet(r2, 0x0, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) 15:48:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x400, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 190.284091] Dev loop0: unable to read RDB block 1 [ 190.289099] loop0: AHDI p2 p4 [ 190.292327] loop0: partition table partially beyond EOD, truncated [ 190.299049] loop0: p2 start 2020327233 is beyond EOD, truncated [ 190.311239] FAULT_INJECTION: forcing a failure. [ 190.311239] name failslab, interval 1, probability 0, space 0, times 0 [ 190.322512] CPU: 1 PID: 13316 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 190.330923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.340281] Call Trace: [ 190.342874] dump_stack+0x1c9/0x2b4 [ 190.346495] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.351684] ? __kernel_text_address+0xd/0x40 [ 190.356168] ? unwind_get_return_address+0x61/0xa0 [ 190.361087] should_fail.cold.4+0xa/0x11 [ 190.365138] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.370232] ? save_stack+0xa9/0xd0 [ 190.373848] ? save_stack+0x43/0xd0 [ 190.377464] ? kasan_kmalloc+0xc4/0xe0 [ 190.381340] ? kmem_cache_alloc_trace+0x152/0x780 [ 190.386169] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 190.391344] ? __list_lru_init+0x4d6/0x840 [ 190.395567] ? alloc_super+0x9a6/0xb10 [ 190.399441] ? vfs_get_super+0x6e/0x270 [ 190.403404] ? proc_get_tree+0x88/0xb0 [ 190.407278] ? vfs_get_tree+0x1cb/0x5c0 [ 190.411240] ? do_mount+0x6c1/0x1fb0 [ 190.414940] ? ksys_mount+0x12d/0x140 [ 190.418728] ? __x64_sys_mount+0xbe/0x150 [ 190.422865] ? do_syscall_64+0x1b9/0x820 [ 190.426914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.432267] ? save_stack+0xa9/0xd0 [ 190.435885] ? lock_acquire+0x1e4/0x540 [ 190.439847] ? fs_reclaim_acquire+0x20/0x20 [ 190.444154] ? lock_downgrade+0x8f0/0x8f0 [ 190.448305] ? __x64_sys_mount+0xbe/0x150 [ 190.452444] ? check_same_owner+0x340/0x340 [ 190.456751] ? rcu_note_context_switch+0x730/0x730 [ 190.461668] __should_failslab+0x124/0x180 [ 190.465894] should_failslab+0x9/0x14 [ 190.469683] kmem_cache_alloc_trace+0x2cb/0x780 [ 190.474360] ? kasan_kmalloc+0xc4/0xe0 [ 190.478238] __memcg_init_list_lru_node+0x185/0x2d0 [ 190.483248] ? kvfree_rcu+0x20/0x20 [ 190.486859] ? __kmalloc_node+0x47/0x70 [ 190.490822] __list_lru_init+0x4d6/0x840 [ 190.494873] ? list_lru_destroy+0x500/0x500 [ 190.499183] ? prealloc_shrinker+0x213/0x480 [ 190.503578] ? __init_waitqueue_head+0x9e/0x150 [ 190.508234] ? inactive_list_is_low+0x850/0x850 [ 190.512890] ? __lockdep_init_map+0x105/0x590 [ 190.517377] alloc_super+0x9a6/0xb10 [ 190.521081] ? destroy_unused_super.part.11+0x110/0x110 [ 190.526434] ? lock_downgrade+0x8f0/0x8f0 [ 190.530574] ? kasan_check_read+0x11/0x20 [ 190.534711] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 190.539283] ? kasan_check_write+0x14/0x20 [ 190.543506] ? do_raw_spin_lock+0xc1/0x200 [ 190.547731] ? ns_test_super+0x50/0x50 [ 190.551745] sget_fc+0x269/0x950 [ 190.555101] ? compare_single+0x10/0x10 [ 190.559124] ? alloc_super+0xb10/0xb10 [ 190.563002] ? kasan_kmalloc+0xc4/0xe0 [ 190.566883] ? __kmalloc_track_caller+0x311/0x760 [ 190.571713] ? proc_root_lookup+0x60/0x60 [ 190.575979] vfs_get_super+0x6e/0x270 [ 190.579768] proc_get_tree+0x88/0xb0 [ 190.583492] vfs_get_tree+0x1cb/0x5c0 [ 190.587280] do_mount+0x6c1/0x1fb0 [ 190.590809] ? check_same_owner+0x340/0x340 [ 190.595117] ? lock_release+0xa30/0xa30 [ 190.599082] ? copy_mount_string+0x40/0x40 [ 190.603305] ? kasan_kmalloc+0xc4/0xe0 [ 190.607182] ? kmem_cache_alloc_trace+0x318/0x780 [ 190.612016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 190.617546] ? _copy_from_user+0xdf/0x150 [ 190.621683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.627231] ? copy_mount_options+0x285/0x380 [ 190.631716] ksys_mount+0x12d/0x140 [ 190.635331] __x64_sys_mount+0xbe/0x150 [ 190.639296] do_syscall_64+0x1b9/0x820 [ 190.643171] ? finish_task_switch+0x1d3/0x870 [ 190.647654] ? syscall_return_slowpath+0x5e0/0x5e0 [ 190.652574] ? syscall_return_slowpath+0x31d/0x5e0 [ 190.657494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 190.662497] ? prepare_exit_to_usermode+0x291/0x3b0 [ 190.668126] ? perf_trace_sys_enter+0xb10/0xb10 [ 190.672780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.677614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.682792] RIP: 0033:0x455ab9 [ 190.685961] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.705142] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.712841] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 190.720096] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 190.727350] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 15:48:11 executing program 0: syz_read_part_table(0x33b20, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:11 executing program 4 (fault-call:11 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 190.734603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 190.741858] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000020 15:48:12 executing program 6: prctl$setendian(0x14, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x37d, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x4000, 0x1}) 15:48:12 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4001, 0x0) accept$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x50e4, 0x8, 0x81, 0x5, 0x2ff7}, 0x14) fallocate(r0, 0x30, 0xe, 0xffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x42001, 0x0) sendto$inet6(r1, &(0x7f0000000140)="611b679859704f42098d2635986f37548b98f81414345ba027b50e8e5813d409ab3db77a9d6d0168a70d56f2eca6f6b64af1eee47d5206eae38dc47a5f28d57965e182267f6efc151dd7a3e1c2a03799815adfaf1dd78f59bb3ce5a355cec001d07dbd00204e22c6a00501a4ef001ce45fa4fea5b56bb1224ace3f1433e2ab8581d1ec3c04cf316fa8739f373c1221e50f0fa7721e5ac65ddbcecb26", 0x9c, 0x4880, &(0x7f0000000200)={0xa, 0x4e23, 0xfffffffffffffff7, @mcast1={0xff, 0x1, [], 0x1}, 0x24}, 0x1c) ustat(0x100005, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0x99, "7aa97eacf38bd3e700e7d7ba8b2f0d55bda7700c3ad057a20346e4b0f4a757906ae6273fe062797b801ccf309d72d595538850383a331b3cd5bbcb048936db7df848de2008c02488d9a2f7a4f8ad3fea3259667cbd7b85333c83067a53a1a6c8edf436c7f7318780fc799ae6ea06b52ac57c174f2d7ae5be02b8f7d160e31578044c48688599ebb1360f473f97001049adb348aa62b21795cb"}, &(0x7f00000002c0)=0xa1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000400)={r2, 0x1000}, 0x8) [ 190.836115] Dev loop3: unable to read RDB block 1 [ 190.841084] loop3: AHDI p2 p4 [ 190.844320] loop3: partition table partially beyond EOD, truncated [ 190.850790] loop3: p2 start 2020327233 is beyond EOD, truncated 15:48:12 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x2) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback}, &(0x7f0000000180)=0xc) bind$packet(r0, &(0x7f00000001c0)={0x11, 0xf6, r1, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 190.912470] Dev loop2: unable to read RDB block 1 [ 190.917463] loop2: AHDI p2 p4 [ 190.920700] loop2: partition table partially beyond EOD, truncated [ 190.927332] loop2: p2 start 2020327233 is beyond EOD, truncated 15:48:12 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10102, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x7f, "32e03efb49fd3bfbbe838a1cad16d8d48b9fb8f0a77e76b22d83607405d09432344d35243844e4de62ad602ba9e324eca02261989dc521e6941d029e1037eb2b4fa503b3e95136ddfcf24d487688942f7062f01bd228490f31abddbbb297bc7f7cfa173bfd769e542fef91cef2050936acd8cd78227bb977f90792168bbbc5"}, &(0x7f00000002c0)=0x87) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, &(0x7f0000000140), 0x0, 0x40000000, &(0x7f0000000300)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0x0, 0x800}, 0x14) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000300), 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001680)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="bc", 0x1) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005200)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000036c0)="c6b64e03f4b5870e334f0bee3b2cced561ec79bdd8c76fafff1a4d08fec8b36d0675cbced940beb7abc8a8685e1822cbec65a166a937b0efbb08d4875371543613906b63e3cb09a65efbab12f5e758303bfe2df9a21a2df3fbe94ac2b46b821b16461f4043d2c38e6aed4c3bd4b430e41e05603587905632cd74572fccc885204779c850016df1b8f3ef0c28543c069b4bba951d548e760d7706dfb8a64e6f4423c4036fda03c760fddda4b60275a0a5a94748f8d2047c58d486efe8c61efceb5a6f0e295b39f396edd5cf2ffdd2ea9364a03a8f1e44b976e99b4c5d4282ac2cb2458704f7d0eb33f89dd3aa21ae9a0dd1f9fec1574d44d2d3bd6c1ea7fae218", 0x100}], 0x1}], 0x1, 0x0) recvmsg(r3, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 15:48:12 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000140)=0x10001, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="4b0400200f000000204a11f5f7e0ab9273a20f64ad624ce4937d2b7eb64a7afc53f48c41bbc8e251"]}) getsockname$inet6(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000080)=0x1c) 15:48:12 executing program 0: syz_read_part_table(0x2, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) [ 191.070508] loop0: AHDI p2 p4 [ 191.074606] loop0: p2 start 2020327233 is beyond EOD, truncated [ 191.104189] loop0: AHDI p2 p4 [ 191.109492] loop0: p2 start 2020327233 is beyond EOD, truncated [ 191.140422] FAULT_INJECTION: forcing a failure. [ 191.140422] name failslab, interval 1, probability 0, space 0, times 0 [ 191.151716] CPU: 1 PID: 13365 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 191.152265] Dev loop3: unable to read RDB block 1 [ 191.160123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.160129] Call Trace: [ 191.160153] dump_stack+0x1c9/0x2b4 [ 191.160170] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.160191] ? __kernel_text_address+0xd/0x40 [ 191.160205] ? unwind_get_return_address+0x61/0xa0 [ 191.160230] should_fail.cold.4+0xa/0x11 [ 191.165105] loop3: AHDI p2 p4 [ 191.174427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.174445] ? save_stack+0xa9/0xd0 [ 191.174466] ? save_stack+0x43/0xd0 [ 191.177050] loop3: partition table partially beyond EOD, [ 191.180644] ? kasan_kmalloc+0xc4/0xe0 [ 191.180662] ? kmem_cache_alloc_trace+0x152/0x780 [ 191.185864] truncated [ 191.190339] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 191.190356] ? __list_lru_init+0x4d6/0x840 [ 191.196359] loop3: p2 start 2020327233 is beyond EOD, [ 191.199319] ? alloc_super+0x9a6/0xb10 [ 191.199333] ? vfs_get_super+0x6e/0x270 [ 191.199349] ? proc_get_tree+0x88/0xb0 [ 191.199360] ? vfs_get_tree+0x1cb/0x5c0 [ 191.199372] ? do_mount+0x6c1/0x1fb0 [ 191.199384] ? ksys_mount+0x12d/0x140 [ 191.199398] ? __x64_sys_mount+0xbe/0x150 [ 191.199413] ? do_syscall_64+0x1b9/0x820 [ 191.199429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.199448] ? save_stack+0xa9/0xd0 [ 191.199465] ? lock_acquire+0x1e4/0x540 [ 191.199477] ? fs_reclaim_acquire+0x20/0x20 [ 191.199495] ? lock_downgrade+0x8f0/0x8f0 [ 191.202682] truncated [ 191.207762] ? __x64_sys_mount+0xbe/0x150 [ 191.207779] ? check_same_owner+0x340/0x340 [ 191.207797] ? rcu_note_context_switch+0x730/0x730 [ 191.314700] __should_failslab+0x124/0x180 [ 191.318934] should_failslab+0x9/0x14 [ 191.322725] kmem_cache_alloc_trace+0x2cb/0x780 [ 191.327385] ? kasan_kmalloc+0xc4/0xe0 [ 191.331265] __memcg_init_list_lru_node+0x185/0x2d0 [ 191.336268] ? kvfree_rcu+0x20/0x20 [ 191.339879] ? __kmalloc_node+0x47/0x70 [ 191.343839] __list_lru_init+0x4d6/0x840 [ 191.347888] ? list_lru_destroy+0x500/0x500 [ 191.352197] ? prealloc_shrinker+0x213/0x480 [ 191.356593] ? __init_waitqueue_head+0x9e/0x150 [ 191.361250] ? inactive_list_is_low+0x850/0x850 [ 191.365905] ? __lockdep_init_map+0x105/0x590 [ 191.370388] alloc_super+0x9a6/0xb10 [ 191.374093] ? destroy_unused_super.part.11+0x110/0x110 [ 191.379445] ? lock_downgrade+0x8f0/0x8f0 [ 191.383603] ? kasan_check_read+0x11/0x20 [ 191.387741] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 191.392310] ? kasan_check_write+0x14/0x20 [ 191.396530] ? do_raw_spin_lock+0xc1/0x200 [ 191.400755] ? ns_test_super+0x50/0x50 [ 191.404630] sget_fc+0x269/0x950 [ 191.407986] ? compare_single+0x10/0x10 [ 191.411951] ? alloc_super+0xb10/0xb10 [ 191.415827] ? kasan_kmalloc+0xc4/0xe0 [ 191.419701] ? __kmalloc_track_caller+0x311/0x760 [ 191.424534] ? proc_root_lookup+0x60/0x60 [ 191.428672] vfs_get_super+0x6e/0x270 [ 191.432461] proc_get_tree+0x88/0xb0 [ 191.436161] vfs_get_tree+0x1cb/0x5c0 [ 191.439949] do_mount+0x6c1/0x1fb0 [ 191.443475] ? check_same_owner+0x340/0x340 [ 191.447782] ? lock_release+0xa30/0xa30 [ 191.451747] ? copy_mount_string+0x40/0x40 [ 191.455969] ? kasan_kmalloc+0xc4/0xe0 [ 191.459848] ? kmem_cache_alloc_trace+0x318/0x780 [ 191.464798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.470324] ? _copy_from_user+0xdf/0x150 [ 191.474582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.480107] ? copy_mount_options+0x285/0x380 [ 191.484594] ksys_mount+0x12d/0x140 [ 191.488213] __x64_sys_mount+0xbe/0x150 [ 191.492177] do_syscall_64+0x1b9/0x820 [ 191.496051] ? finish_task_switch+0x1d3/0x870 [ 191.500552] ? syscall_return_slowpath+0x5e0/0x5e0 [ 191.505469] ? syscall_return_slowpath+0x31d/0x5e0 [ 191.510388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 191.515394] ? prepare_exit_to_usermode+0x291/0x3b0 [ 191.520398] ? perf_trace_sys_enter+0xb10/0xb10 [ 191.525058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.529890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.535065] RIP: 0033:0x455ab9 [ 191.538234] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.557424] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.565121] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 191.572378] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 191.579633] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 191.586886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 191.594141] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000021 [ 191.605573] Dev loop2: unable to read RDB block 1 [ 191.610583] loop2: AHDI p2 p4 [ 191.613864] loop2: partition table partially beyond EOD, truncated [ 191.641825] loop2: p2 start 2020327233 is beyond EOD, truncated [ 191.651408] Dev loop0: unable to read RDB block 1 [ 191.656389] loop0: AHDI p2 p4 [ 191.659629] loop0: partition table partially beyond EOD, truncated [ 191.675859] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000be6ff8)={0x19980330}, &(0x7f000032e000)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x7}, &(0x7f0000000140)=0x8) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000001c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 15:48:12 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = memfd_create(&(0x7f0000000080)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x200}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x7f, &(0x7f0000ffb000/0x4000)=nil, 0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8, 0xc002) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) [ 191.689542] Dev loop3: unable to read RDB block 1 [ 191.694615] loop3: AHDI p2 p4 [ 191.697852] loop3: partition table partially beyond EOD, truncated [ 191.725413] loop3: p2 start 2020327233 is beyond EOD, truncated [ 191.734102] Dev loop0: unable to read RDB block 1 [ 191.739190] loop0: AHDI p2 p4 [ 191.742466] loop0: partition table partially beyond EOD, truncated [ 191.752509] loop0: p2 start 2020327233 is beyond EOD, truncated 15:48:13 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff000000000000000000000000000000000000000000"], 0x6a) 15:48:13 executing program 4 (fault-call:11 fault-nth:34): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 15:48:13 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x20) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x80, 0x2) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x2) 15:48:13 executing program 0: syz_read_part_table(0x1f00000000000000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="9c5b1f191c0ffd8ec2bd99c337e7a0b0d796f05f164aa1edb4327d658f879152ad117306b8d51fd172a62bc05cf90f342697c53c9bf9794d193fc8165f0733fad483779e1307ac1e89af9012cebdde82e599632937b52770d71130d8738c39f1cd0a62bef197bc7f5dd46596635ecf23f3bfc701a4000ab127cd8bc09079b8d935bf8dd72019694b7039d1b6e8e42980fb023d6bcece394a5a7a09934d0ed71faf8b16011f360679021fa39aa397e9fcd4cd6a0ac8595ac951681a2061ccdee77843cbd0e040b88e44ffb41f57dc84aadc6f63cba4eb786bbf41674f99e1f61802e5541a482109f14336a3326159", 0xee, 0x100}]) 15:48:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x40000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:48:13 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x50000, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000140)=""/137, 0x11000, 0x1800, 0xfffffffffffff001}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x200001, 0x0) fcntl$setflags(r0, 0x2, 0x1) keyctl$set_reqkey_keyring(0xe, 0x7) r2 = socket(0xc, 0x80f, 0xa00000000000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e22, 0x7, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1f}, {0xa, 0x4e23, 0x8000, @loopback={0x0, 0x1}, 0x7}, 0xfffffffffffff034, [0x3, 0x8, 0xda59, 0xfffffffffffffff9, 0x2, 0xffff, 0x99e, 0x7fffffff]}, 0x5c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x4, 0x4) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/79, 0x1000000, 0x1000, 0x7}, 0x18) r3 = socket$unix(0x1, 0x0, 0x0) acct(&(0x7f00000002c0)='./file0\x00') pwritev(r3, &(0x7f0000180fe0), 0x0, 0xfffffffffffffffd) [ 191.959422] loop0: AHDI p2 p4 [ 191.962809] Dev loop3: unable to read RDB block 1 [ 191.967750] loop3: AHDI p2 p4 [ 191.970982] loop3: partition table partially beyond EOD, truncated [ 191.977700] loop0: p2 start 2020327233 is beyond EOD, truncated [ 191.984687] loop3: p2 start 2020327233 is beyond EOD, truncated [ 192.017503] loop0: AHDI p2 p4 [ 192.031215] loop0: p2 start 2020327233 is beyond EOD, truncated [ 192.044524] FAULT_INJECTION: forcing a failure. [ 192.044524] name failslab, interval 1, probability 0, space 0, times 0 [ 192.055815] CPU: 1 PID: 13430 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 192.064226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.073584] Call Trace: [ 192.076197] dump_stack+0x1c9/0x2b4 [ 192.079855] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.085101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.090661] ? replace_slot+0xc9/0x4c0 [ 192.094576] should_fail.cold.4+0xa/0x11 [ 192.098668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.103792] ? save_stack+0xa9/0xd0 [ 192.107437] ? save_stack+0x43/0xd0 [ 192.111079] ? kasan_kmalloc+0xc4/0xe0 [ 192.114982] ? __kmalloc+0x14e/0x760 [ 192.118715] ? register_shrinker+0x17/0x40 [ 192.122970] ? sget_fc+0x76f/0x950 [ 192.126530] ? __radix_tree_replace+0x188/0x2f0 [ 192.131205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.136748] ? node_tag_clear+0xc0/0x1c0 [ 192.140823] ? lock_acquire+0x1e4/0x540 [ 192.144792] ? fs_reclaim_acquire+0x20/0x20 [ 192.149105] ? lock_downgrade+0x8f0/0x8f0 [ 192.153248] ? check_same_owner+0x340/0x340 [ 192.157559] ? rcu_note_context_switch+0x730/0x730 [ 192.162479] ? rcu_note_context_switch+0x730/0x730 [ 192.167405] __should_failslab+0x124/0x180 [ 192.171635] should_failslab+0x9/0x14 [ 192.175430] kmem_cache_alloc+0x2af/0x760 [ 192.179572] ? lock_downgrade+0x8f0/0x8f0 [ 192.183707] ? prealloc_shrinker+0x124/0x480 [ 192.188108] ? proc_i_callback+0x30/0x30 [ 192.192164] proc_alloc_inode+0x1b/0x190 [ 192.196218] alloc_inode+0x63/0x190 [ 192.199835] new_inode_pseudo+0x71/0x1a0 [ 192.203889] ? prune_icache_sb+0x1b0/0x1b0 [ 192.208121] ? register_shrinker+0x38/0x40 [ 192.212351] proc_get_inode+0x1e/0x680 [ 192.216238] proc_fill_super+0x32c/0x630 [ 192.220292] ? proc_root_lookup+0x60/0x60 [ 192.224435] ? __kmalloc_track_caller+0x311/0x760 [ 192.229271] ? proc_root_lookup+0x60/0x60 [ 192.233407] vfs_get_super+0x15e/0x270 [ 192.237287] proc_get_tree+0x88/0xb0 [ 192.240993] vfs_get_tree+0x1cb/0x5c0 [ 192.244788] do_mount+0x6c1/0x1fb0 [ 192.248317] ? check_same_owner+0x340/0x340 [ 192.252626] ? lock_release+0xa30/0xa30 [ 192.256598] ? copy_mount_string+0x40/0x40 [ 192.260822] ? kasan_kmalloc+0xc4/0xe0 [ 192.264702] ? kmem_cache_alloc_trace+0x318/0x780 [ 192.269538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.275069] ? _copy_from_user+0xdf/0x150 [ 192.279210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.284738] ? copy_mount_options+0x285/0x380 [ 192.289229] ksys_mount+0x12d/0x140 [ 192.292848] __x64_sys_mount+0xbe/0x150 [ 192.296815] do_syscall_64+0x1b9/0x820 [ 192.300694] ? syscall_return_slowpath+0x5e0/0x5e0 [ 192.305612] ? syscall_return_slowpath+0x31d/0x5e0 [ 192.310533] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 192.315544] ? prepare_exit_to_usermode+0x291/0x3b0 [ 192.320553] ? perf_trace_sys_enter+0xb10/0xb10 [ 192.325214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.330076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.335257] RIP: 0033:0x455ab9 [ 192.338432] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.357718] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 15:48:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/sockcreate\x00') ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 192.365421] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 192.372678] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 192.379934] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 192.387193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 192.394450] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000022 [ 192.401851] proc_fill_super: get root inode failed [ 192.407111] ================================================================== [ 192.407215] Dev loop3: unable to read RDB block 1 [ 192.414492] BUG: KASAN: use-after-free in dput.part.26+0x634/0x7a0 [ 192.414505] Read of size 4 at addr ffff8801b8a4f880 by task syz-executor4/13430 [ 192.414508] [ 192.414522] CPU: 1 PID: 13430 Comm: syz-executor4 Not tainted 4.18.0-rc4-next-20180713+ #7 [ 192.414529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.414533] Call Trace: [ 192.414548] dump_stack+0x1c9/0x2b4 [ 192.414564] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.414574] ? printk+0xa7/0xcf [ 192.414586] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 192.414601] ? dput.part.26+0x634/0x7a0 [ 192.414614] print_address_description+0x6c/0x20b [ 192.414628] ? dput.part.26+0x634/0x7a0 [ 192.414644] kasan_report.cold.7+0x242/0x30d [ 192.414658] __asan_report_load4_noabort+0x14/0x20 [ 192.414670] dput.part.26+0x634/0x7a0 [ 192.414685] ? shrink_dcache_sb+0x350/0x350 [ 192.414705] ? __kasan_slab_free+0x131/0x170 [ 192.419582] loop3: AHDI p2 p4 [ 192.425859] ? trace_hardirqs_on+0xd/0x10 [ 192.425874] dput+0x15/0x20 [ 192.425893] proc_kill_sb+0x125/0x1e0 [ 192.433336] loop3: partition table partially beyond EOD, [ 192.434937] ? proc_get_inode+0x680/0x680 [ 192.434954] ? proc_root_lookup+0x60/0x60 [ 192.443351] truncated [ 192.452693] deactivate_locked_super+0x97/0x100 [ 192.452711] vfs_get_super+0x20f/0x270 [ 192.518737] loop3: p2 start 2020327233 is beyond EOD, [ 192.520704] proc_get_tree+0x88/0xb0 [ 192.520722] vfs_get_tree+0x1cb/0x5c0 [ 192.520740] do_mount+0x6c1/0x1fb0 [ 192.520754] ? check_same_owner+0x340/0x340 [ 192.520769] ? lock_release+0xa30/0xa30 [ 192.520786] ? copy_mount_string+0x40/0x40 [ 192.520804] ? kasan_kmalloc+0xc4/0xe0 [ 192.526352] truncated [ 192.530469] ? kmem_cache_alloc_trace+0x318/0x780 [ 192.530485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.530503] ? _copy_from_user+0xdf/0x150 [ 192.595101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.600629] ? copy_mount_options+0x285/0x380 [ 192.605116] ksys_mount+0x12d/0x140 [ 192.608734] __x64_sys_mount+0xbe/0x150 [ 192.612700] do_syscall_64+0x1b9/0x820 [ 192.616580] ? syscall_return_slowpath+0x5e0/0x5e0 [ 192.621499] ? syscall_return_slowpath+0x31d/0x5e0 [ 192.626416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 192.631422] ? prepare_exit_to_usermode+0x291/0x3b0 [ 192.636425] ? perf_trace_sys_enter+0xb10/0xb10 [ 192.641085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.645920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.651106] RIP: 0033:0x455ab9 [ 192.654298] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.674298] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.682004] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 192.689272] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 192.696532] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 192.703787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 192.711042] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000022 [ 192.718312] [ 192.719926] Allocated by task 12981: [ 192.723639] save_stack+0x43/0xd0 [ 192.727080] kasan_kmalloc+0xc4/0xe0 [ 192.730778] kasan_slab_alloc+0x12/0x20 [ 192.734739] kmem_cache_alloc+0x12e/0x760 [ 192.738873] __d_alloc+0xc8/0xd50 [ 192.742312] d_alloc+0x96/0x380 [ 192.745577] d_alloc_parallel+0x15a/0x1ea0 [ 192.749800] lookup_open+0x567/0x1b70 [ 192.753589] path_openat+0x261e/0x5430 [ 192.757467] do_filp_open+0x255/0x380 [ 192.761252] do_sys_open+0x584/0x720 [ 192.764949] __x64_sys_open+0x7e/0xc0 [ 192.768736] do_syscall_64+0x1b9/0x820 [ 192.772617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.777783] [ 192.779395] Freed by task 12993: [ 192.782751] save_stack+0x43/0xd0 [ 192.786191] __kasan_slab_free+0x11a/0x170 [ 192.790413] kasan_slab_free+0xe/0x10 [ 192.794199] kmem_cache_free+0x86/0x2d0 [ 192.798158] __d_free+0x20/0x30 [ 192.801423] rcu_process_callbacks+0xf98/0x2860 [ 192.806075] __do_softirq+0x2e8/0xb17 [ 192.809872] [ 192.811487] The buggy address belongs to the object at ffff8801b8a4f880 [ 192.811487] which belongs to the cache dentry(81:syz4) of size 288 [ 192.824482] The buggy address is located 0 bytes inside of [ 192.824482] 288-byte region [ffff8801b8a4f880, ffff8801b8a4f9a0) [ 192.836197] The buggy address belongs to the page: [ 192.841120] page:ffffea0006e293c0 count:1 mapcount:0 mapping:ffff8801cfeacc80 index:0xffff8801b8a4f040 [ 192.850550] flags: 0x2fffc0000000100(slab) [ 192.854775] raw: 02fffc0000000100 ffffea000753ef48 ffffea0007242448 ffff8801cfeacc80 [ 192.862645] raw: ffff8801b8a4f040 ffff8801b8a4f040 000000010000000a ffff8801c7fd6280 [ 192.870505] page dumped because: kasan: bad access detected [ 192.876197] page->mem_cgroup:ffff8801c7fd6280 [ 192.880669] [ 192.882277] Memory state around the buggy address: [ 192.887193] ffff8801b8a4f780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.894537] ffff8801b8a4f800: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 192.901882] >ffff8801b8a4f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.909222] ^ [ 192.912573] ffff8801b8a4f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.919920] ffff8801b8a4f980: fb fb fb fb fc fc fc fc fc fc fc fc fb fb fb fb [ 192.927260] ================================================================== [ 192.934835] Kernel panic - not syncing: panic_on_warn set ... [ 192.934835] [ 192.942222] CPU: 1 PID: 13430 Comm: syz-executor4 Tainted: G B 4.18.0-rc4-next-20180713+ #7 [ 192.952017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.961375] Call Trace: [ 192.963968] dump_stack+0x1c9/0x2b4 [ 192.967653] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.972853] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.977623] panic+0x238/0x4e7 [ 192.980820] ? add_taint.cold.5+0x16/0x16 [ 192.984979] ? do_raw_spin_unlock+0xa7/0x2f0 [ 192.989397] ? do_raw_spin_unlock+0xa7/0x2f0 [ 192.993810] ? dput.part.26+0x634/0x7a0 [ 192.997784] kasan_end_report+0x47/0x4f [ 193.001767] kasan_report.cold.7+0x76/0x30d [ 193.006098] __asan_report_load4_noabort+0x14/0x20 [ 193.011033] dput.part.26+0x634/0x7a0 [ 193.014855] ? shrink_dcache_sb+0x350/0x350 15:48:14 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000480)=""/251, 0xffffffc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600fd00000000000000000000000000000000000000000000000000014dffffffffffffff00000000000000000000000000003800000000000000008000000000000001000300060000f4ffffffffffffff000000000000000000000000000000000000000000"], 0x6a) [ 193.019189] ? __kasan_slab_free+0x131/0x170 [ 193.023618] ? trace_hardirqs_on+0xd/0x10 [ 193.027776] dput+0x15/0x20 [ 193.030707] proc_kill_sb+0x125/0x1e0 [ 193.034546] ? proc_get_inode+0x680/0x680 [ 193.038700] ? proc_root_lookup+0x60/0x60 [ 193.042849] deactivate_locked_super+0x97/0x100 [ 193.047528] vfs_get_super+0x20f/0x270 [ 193.051430] proc_get_tree+0x88/0xb0 [ 193.055157] vfs_get_tree+0x1cb/0x5c0 [ 193.058969] do_mount+0x6c1/0x1fb0 [ 193.062517] ? check_same_owner+0x340/0x340 [ 193.066837] ? lock_release+0xa30/0xa30 15:48:14 executing program 5: fchdir(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7, &(0x7f00000000c0)) geteuid() r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3f, 0x2) ioctl$TCXONC(r1, 0x540a, 0xcf4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x24080, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) [ 193.070811] ? copy_mount_string+0x40/0x40 [ 193.075049] ? kasan_kmalloc+0xc4/0xe0 [ 193.078937] ? kmem_cache_alloc_trace+0x318/0x780 [ 193.083788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.089341] ? _copy_from_user+0xdf/0x150 [ 193.093507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.099061] ? copy_mount_options+0x285/0x380 [ 193.103571] ksys_mount+0x12d/0x140 [ 193.107220] __x64_sys_mount+0xbe/0x150 [ 193.111211] do_syscall_64+0x1b9/0x820 [ 193.115119] ? syscall_return_slowpath+0x5e0/0x5e0 [ 193.120067] ? syscall_return_slowpath+0x31d/0x5e0 [ 193.125014] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 193.130044] ? prepare_exit_to_usermode+0x291/0x3b0 [ 193.135072] ? perf_trace_sys_enter+0xb10/0xb10 [ 193.139754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.144624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.149820] RIP: 0033:0x455ab9 [ 193.153011] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.172327] RSP: 002b:00007f45a93d3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.180044] RAX: ffffffffffffffda RBX: 00007f45a93d46d4 RCX: 0000000000455ab9 [ 193.187317] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 193.194594] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 193.201864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 193.209138] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000022 [ 193.216849] Dumping ftrace buffer: [ 193.220397] (ftrace buffer empty) [ 193.224100] Kernel Offset: disabled [ 193.227738] Rebooting in 86400 seconds..