6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:42:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x7, 0x0, 0x0, 0x50000}]}) 04:42:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7b}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0xfc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2024.346638][ T27] audit: type=1326 audit(1588653741.717:19453): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5353 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0xc, 0x0, 0x0, 0x50000}]}) [ 2024.427615][ T5355] Dev loop4: unable to read RDB block 4 [ 2024.437101][ T5355] loop4: unable to read partition table 04:42:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7c}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2024.468220][ T5355] loop4: partition table beyond EOD, truncated [ 2024.498735][ T5355] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x14, 0x0, 0x0, 0x50000}]}) 04:42:22 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x15, 0x0, 0x0, 0x50000}]}) 04:42:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x16, 0x0, 0x0, 0x50000}]}) [ 2024.761177][ T4115] Dev loop4: unable to read RDB block 4 [ 2024.771165][ T4115] loop4: unable to read partition table [ 2024.795990][ T4115] loop4: partition table beyond EOD, truncated [ 2024.837750][ T5375] Dev loop4: unable to read RDB block 4 [ 2024.851054][ T5375] loop4: unable to read partition table [ 2024.869902][ T5375] loop4: partition table beyond EOD, truncated [ 2024.880322][ T27] audit: type=1326 audit(1588653742.248:19454): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5383 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2024.921881][ T5375] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2025.065228][ T5387] Dev loop4: unable to read RDB block 4 [ 2025.071007][ T5387] loop4: unable to read partition table [ 2025.083556][ T5387] loop4: partition table beyond EOD, truncated [ 2025.098049][ T5387] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7400000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7d}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2025.156053][ T27] audit: type=1326 audit(1588653742.528:19455): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5353 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:22 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7e}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x84}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2025.410668][ T5402] Dev loop4: unable to read RDB block 4 [ 2025.417788][ T5402] loop4: unable to read partition table [ 2025.441487][ T5402] loop4: partition table beyond EOD, truncated [ 2025.477845][ T5402] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x87}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2025.671590][ T5413] Dev loop4: unable to read RDB block 4 [ 2025.677331][ T5413] loop4: unable to read partition table [ 2025.723523][ T5413] loop4: partition table beyond EOD, truncated 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x1c, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x94}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2025.779864][ T5413] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x1d, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7a00000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:23 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x21, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x9c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x9}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xa4}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2026.206249][ T5439] Dev loop4: unable to read RDB block 4 [ 2026.212216][ T5439] loop4: unable to read partition table 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x24, 0x0, 0x0, 0x50000}]}) [ 2026.254564][ T5439] loop4: partition table beyond EOD, truncated [ 2026.291081][ T5439] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x10}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x25, 0x0, 0x0, 0x50000}]}) 04:42:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xac}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2026.505787][ T5457] Dev loop4: unable to read RDB block 4 [ 2026.514204][ T5457] loop4: unable to read partition table [ 2026.519928][ T5457] loop4: partition table beyond EOD, truncated 04:42:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x28, 0x0, 0x0, 0x50000}]}) [ 2026.577786][ T5457] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2026.751569][ T5469] Dev loop4: unable to read RDB block 4 [ 2026.757403][ T5469] loop4: unable to read partition table [ 2026.775976][ T5469] loop4: partition table beyond EOD, truncated [ 2026.805366][ T5469] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2026.911782][ T4115] Dev loop4: unable to read RDB block 4 [ 2026.924200][ T4115] loop4: unable to read partition table [ 2026.951515][ T4115] loop4: partition table beyond EOD, truncated [ 2026.981571][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 2026.981580][ T27] audit: type=1326 audit(1588653744.358:19459): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5437 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xeaffffff00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x2c, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x30}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xb1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2027.156152][ T27] audit: type=1326 audit(1588653744.528:19460): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5481 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x2d, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2027.200834][ T5483] Dev loop4: unable to read RDB block 4 [ 2027.206885][ T5483] loop4: unable to read partition table [ 2027.230786][ T5483] loop4: partition table beyond EOD, truncated [ 2027.274684][ T5483] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x30, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x50}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:24 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x34, 0x0, 0x0, 0x50000}]}) [ 2027.446052][ T5495] Dev loop4: unable to read RDB block 4 [ 2027.454104][ T5495] loop4: unable to read partition table [ 2027.464942][ T5495] loop4: partition table beyond EOD, truncated [ 2027.471793][ T5495] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2027.684636][ T5509] Dev loop4: unable to read RDB block 4 [ 2027.690365][ T5509] loop4: unable to read partition table [ 2027.714415][ T5509] loop4: partition table beyond EOD, truncated [ 2027.730652][ T5509] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2027.739921][ T4115] Dev loop4: unable to read RDB block 4 [ 2027.750337][ T4115] loop4: unable to read partition table [ 2027.769220][ T4115] loop4: partition table beyond EOD, truncated 04:42:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xf202000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x35, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x60}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x2}]) [ 2027.988244][ T27] audit: type=1326 audit(1588653745.358:19461): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5481 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2028.073616][ T27] audit: type=1326 audit(1588653745.438:19462): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5522 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2028.122687][ T5526] Dev loop4: unable to read RDB block 4 [ 2028.128508][ T5526] loop4: unable to read partition table 04:42:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x70}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2028.177891][ T5526] loop4: partition table beyond EOD, truncated [ 2028.184360][ T5526] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x3c, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x90}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x6}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2028.306972][ T5533] Dev loop4: unable to read RDB block 4 [ 2028.326110][ T5533] loop4: unable to read partition table [ 2028.355373][ T5533] loop4: partition table beyond EOD, truncated 04:42:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x3d, 0x0, 0x0, 0x50000}]}) [ 2028.402281][ T5533] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x44, 0x0, 0x0, 0x50000}]}) 04:42:25 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x3}]) [ 2028.704061][ T5554] Dev loop4: unable to read RDB block 4 [ 2028.709857][ T5554] loop4: unable to read partition table [ 2028.731932][ T5554] loop4: partition table beyond EOD, truncated [ 2028.740638][ T5554] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2028.867893][ T27] audit: type=1326 audit(1588653746.238:19463): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5522 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfa03000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x45, 0x0, 0x0, 0x50000}]}) 04:42:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xb0}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x9}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:26 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x4}]) [ 2028.958659][ T27] audit: type=1326 audit(1588653746.328:19464): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5564 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x48, 0x0, 0x0, 0x50000}]}) [ 2029.031593][ T5570] Dev loop4: unable to read RDB block 4 [ 2029.037491][ T5570] loop4: unable to read partition table 04:42:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xfc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2029.073052][ T5570] loop4: partition table beyond EOD, truncated [ 2029.088341][ T5570] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:26 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x5}]) 04:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x4c, 0x0, 0x0, 0x50000}]}) 04:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x4d, 0x0, 0x0, 0x50000}]}) 04:42:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x30}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2029.266409][ T5583] Dev loop4: unable to read RDB block 4 [ 2029.274664][ T5583] loop4: unable to read partition table [ 2029.294981][ T5583] loop4: partition table beyond EOD, truncated [ 2029.349387][ T5583] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x50, 0x0, 0x0, 0x50000}]}) [ 2029.541335][ T5600] Dev loop4: unable to read RDB block 4 [ 2029.547097][ T5600] loop4: unable to read partition table [ 2029.554208][ T5600] loop4: partition table beyond EOD, truncated [ 2029.561510][ T5600] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2029.630421][ T4115] Dev loop4: unable to read RDB block 4 [ 2029.636726][ T4115] loop4: unable to read partition table [ 2029.650564][ T4115] loop4: partition table beyond EOD, truncated 04:42:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfc00000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0xfc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x1a2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x54, 0x0, 0x0, 0x50000}]}) 04:42:27 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xf}]) [ 2029.762577][ T27] audit: type=1326 audit(1588653747.138:19465): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5564 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x5c, 0x0, 0x0, 0x50000}]}) [ 2029.868455][ T27] audit: type=1326 audit(1588653747.238:19466): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5608 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x60, 0x0, 0x0, 0x50000}]}) [ 2029.955734][ T5615] Dev loop4: unable to read RDB block 4 [ 2029.963964][ T5615] loop4: unable to read partition table [ 2029.989258][ T5615] loop4: partition table beyond EOD, truncated 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x61, 0x0, 0x0, 0x50000}]}) [ 2030.006360][ T5615] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:27 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x12}]) 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x64, 0x0, 0x0, 0x50000}]}) 04:42:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x2f2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6c, 0x0, 0x0, 0x50000}]}) [ 2030.241785][ T5631] Dev loop4: unable to read RDB block 4 [ 2030.247726][ T5631] loop4: unable to read partition table [ 2030.258605][ T5631] loop4: partition table beyond EOD, truncated [ 2030.266721][ T5631] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2030.371618][ T5642] Dev loop4: unable to read RDB block 4 [ 2030.377407][ T5642] loop4: unable to read partition table [ 2030.385976][ T5642] loop4: partition table beyond EOD, truncated [ 2030.393089][ T5642] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfeffffff00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x3fa}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x74, 0x0, 0x0, 0x50000}]}) [ 2030.666167][ T27] audit: type=1326 audit(1588653748.038:19467): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5608 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:28 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x25}]) 04:42:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x7c, 0x0, 0x0, 0x50000}]}) [ 2030.781176][ T27] audit: type=1326 audit(1588653748.158:19468): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5653 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2030.852330][ T5655] Dev loop4: unable to read RDB block 4 [ 2030.858037][ T5655] loop4: unable to read partition table [ 2030.874024][ T5655] loop4: partition table beyond EOD, truncated [ 2030.880425][ T5655] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:28 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x3a9}]) 04:42:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x84, 0x0, 0x0, 0x50000}]}) 04:42:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x600}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x87, 0x0, 0x0, 0x50000}]}) [ 2031.066174][ T5667] Dev loop4: unable to read RDB block 4 [ 2031.092591][ T5667] loop4: unable to read partition table [ 2031.139088][ T5667] loop4: partition table beyond EOD, truncated [ 2031.195149][ T5667] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x94, 0x0, 0x0, 0x50000}]}) 04:42:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x2}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2031.334211][ T5680] Dev loop4: unable to read RDB block 4 [ 2031.355687][ T5680] loop4: unable to read partition table [ 2031.387382][ T5680] loop4: partition table beyond EOD, truncated [ 2031.436856][ T5680] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xff2f000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x900}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x9c, 0x0, 0x0, 0x50000}]}) 04:42:29 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x600}]) 04:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0xa4, 0x0, 0x0, 0x50000}]}) [ 2031.781017][ T5700] Dev loop4: unable to read RDB block 6 [ 2031.797066][ T5700] loop4: unable to read partition table 04:42:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x2000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2031.821598][ T5700] loop4: partition table beyond EOD, truncated 04:42:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2031.871710][ T5700] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0xac, 0x0, 0x0, 0x50000}]}) 04:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0xb1, 0x0, 0x0, 0x50000}]}) [ 2032.072525][ T5716] Dev loop4: unable to read RDB block 6 [ 2032.079092][ T5716] loop4: unable to read partition table 04:42:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x3000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2032.150359][ T5716] loop4: partition table beyond EOD, truncated 04:42:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x9}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2032.195833][ T5716] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2032.347044][ T4115] Dev loop4: unable to read RDB block 6 [ 2032.354055][ T4115] loop4: unable to read partition table [ 2032.367734][ T4115] loop4: partition table beyond EOD, truncated 04:42:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffdffa5f00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:29 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x700}]) 04:42:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x3f00}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2032.519355][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 2032.519363][ T27] audit: type=1326 audit(1588653749.888:19471): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5694 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x30}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2032.655756][ T27] audit: type=1326 audit(1588653750.029:19472): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5735 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x2, 0x0, 0x50000}]}) [ 2032.713256][ T5738] Dev loop4: unable to read RDB block 7 [ 2032.720978][ T5738] loop4: unable to read partition table [ 2032.738387][ T5738] loop4: partition table beyond EOD, truncated [ 2032.800240][ T5738] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x3, 0x0, 0x50000}]}) [ 2032.915166][ T5746] Dev loop4: unable to read RDB block 7 [ 2032.921697][ T5746] loop4: unable to read partition table [ 2032.946477][ T5746] loop4: partition table beyond EOD, truncated 04:42:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0xfc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2032.980076][ T5746] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x4000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x4, 0x0, 0x50000}]}) 04:42:30 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xffa}]) 04:42:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2033.160646][ T4115] Dev loop4: unable to read RDB block 7 [ 2033.166284][ T4115] loop4: unable to read partition table [ 2033.174716][ T4115] loop4: partition table beyond EOD, truncated [ 2033.323910][ T5764] Dev loop4: unable to read RDB block 15 [ 2033.334403][ T5764] loop4: unable to read partition table [ 2033.347045][ T5764] loop4: partition table beyond EOD, truncated [ 2033.363155][ T5764] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2033.439672][ T27] audit: type=1326 audit(1588653750.809:19473): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5735 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2033.468136][ T5770] Dev loop4: unable to read RDB block 15 [ 2033.477508][ T5770] loop4: unable to read partition table 04:42:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffffc90000fb6000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x6, 0x0, 0x50000}]}) 04:42:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x5000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2033.492403][ T5770] loop4: partition table beyond EOD, truncated [ 2033.505879][ T5770] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:30 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xff00}]) [ 2033.584463][ T4115] Dev loop4: unable to read RDB block 15 04:42:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffffffff00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x9, 0x0, 0x50000}]}) [ 2033.631196][ T4115] loop4: unable to read partition table [ 2033.640404][ T4115] loop4: partition table beyond EOD, truncated 04:42:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x6000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2033.697687][ T27] audit: type=1326 audit(1588653751.069:19474): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5785 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0xf, 0x0, 0x50000}]}) 04:42:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x7000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:31 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x7ffffff2}]) 04:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x31, 0x0, 0x50000}]}) 04:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0xfc, 0x0, 0x50000}]}) 04:42:31 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x7ffffff8}]) 04:42:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x9000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2034.503037][ T27] audit: type=1326 audit(1588653751.879:19475): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5785 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:31 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x7ffffff9}]) 04:42:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x9}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xa201}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xb000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:32 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xffffff1f}]) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x6, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x2, 0x50000}]}) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0xa, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xf202}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x10}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x3, 0x50000}]}) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x13, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xffffc90000000000}]) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x14, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x64, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:42:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x4, 0x50000}]}) 04:42:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2}, {0x6}]}) 04:42:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xfa03}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2035.330599][ T27] audit: type=1326 audit(1588653752.709:19476): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5894 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x6, 0x50000}]}) 04:42:32 executing program 4: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {0x0, r4, r2}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0x3, 0x704, "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", 0x41, 0x80, 0x4, 0x80, 0x2, 0x7, 0x1f, 0x1}, r4}}, 0x128) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200008}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, r7, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x84, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f06}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff001}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x712ca3c2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r8, 0x113, 0x4, &(0x7f0000000380)=0x1, 0x4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x30}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x9, 0x50000}]}) [ 2035.604969][ T5902] Dev loop4: unable to read RDB block 4 [ 2035.623586][ T5902] loop4: unable to read partition table [ 2035.665256][ T5902] loop4: partition table beyond EOD, truncated 04:42:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x50}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xfc00}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2035.710824][ T5902] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0xf, 0x50000}]}) [ 2035.901893][ T5917] Dev loop4: unable to read RDB block 4 [ 2035.915491][ T5917] loop4: unable to read partition table [ 2035.958088][ T5917] loop4: partition table beyond EOD, truncated 04:42:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x31, 0x50000}]}) [ 2036.009716][ T5917] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2036.133701][ T27] audit: type=1326 audit(1588653753.509:19477): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5894 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:33 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) 04:42:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0xfc, 0x50000}]}) 04:42:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6}]}) 04:42:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x17000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x60}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x7000}]}) [ 2036.311525][ T27] audit: type=1326 audit(1588653753.689:19478): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5935 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2036.368950][ T5932] Dev loop4: unable to read RDB block 4 [ 2036.377406][ T5932] loop4: unable to read partition table [ 2036.398091][ T5932] loop4: partition table beyond EOD, truncated [ 2036.418343][ T27] audit: type=1326 audit(1588653753.789:19479): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5940 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2036.452875][ T5932] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x27000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2036.580244][ T5944] Dev loop4: unable to read RDB block 4 [ 2036.585977][ T5944] loop4: unable to read partition table [ 2036.595548][ T5944] loop4: partition table beyond EOD, truncated [ 2036.604586][ T5944] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x70}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x37000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:34 executing program 4: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x10001, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000140)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x509181, 0x0) sendto$inet(r5, &(0x7f0000000080)="c916c7c60ed32c7c1022a16a527d779fa32256f642b1cd0bda27d7d344309b9ee999bf6392c47ec7", 0x28, 0x800, &(0x7f00000000c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_read_part_table(0x20, 0x0, &(0x7f00000023c0)) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r7 = accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r8) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000240)=[r7, r5, r8, r2], 0x4) 04:42:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x487d2}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2037.119482][ T27] audit: type=1326 audit(1588653754.479:19480): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5935 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:34 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x3}]) 04:42:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4}, {0x6}]}) 04:42:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x17000}]}) [ 2037.340502][ T5977] Dev loop4: unable to read RDB block 4 [ 2037.346288][ T5977] loop4: unable to read partition table [ 2037.367430][ T5977] loop4: partition table beyond EOD, truncated 04:42:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x90}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x100000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2037.386375][ T5977] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2037.523469][ T5986] Dev loop4: unable to read RDB block 4 [ 2037.539617][ T5986] loop4: unable to read partition table [ 2037.545372][ T5986] loop4: partition table beyond EOD, truncated [ 2037.626907][ T5986] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:35 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x8000000) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0x400, 0x7fff, [], &(0x7f0000000000)=0x81}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x200000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xa0}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2037.860015][ T5997] Dev loop4: unable to read RDB block 4 [ 2037.867042][ T5997] loop4: unable to read partition table [ 2037.906436][ T5997] loop4: partition table beyond EOD, truncated [ 2037.940654][ T5997] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:35 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x300000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x47000}]}) [ 2038.098392][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 2038.098400][ T27] audit: type=1326 audit(1588653755.459:19484): auid=0 uid=0 gid=0 ses=4 subj=_ pid=5981 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x10000 04:42:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x5}, {0x6}]}) [ 2038.232700][ T27] audit: type=1326 audit(1588653755.599:19485): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6013 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2038.289971][ T6010] Dev loop4: unable to read RDB block 4 [ 2038.305993][ T6010] loop4: unable to read partition table [ 2038.320609][ T27] audit: type=1326 audit(1588653755.669:19486): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x40000 04:42:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xb0}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2038.346541][ T6010] loop4: partition table beyond EOD, truncated [ 2038.377163][ T6010] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x400000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:35 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r6}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000027c0)={r6}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000080)={r6, @in={{0x2, 0x4e24, @remote}}, 0x20, 0xfff, 0x89ef, 0x4, 0x8}, &(0x7f0000000000)=0x98) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f00000001c0)="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", 0x1d6, 0x1}]) 04:42:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x500000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2038.653679][ T6028] Dev loop4: unable to read RDB block 4 [ 2038.672435][ T6028] loop4: unable to read partition table 04:42:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xfc}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2038.697133][ T6028] loop4: partition table beyond EOD, truncated [ 2038.718089][ T6028] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:36 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)={0x4c, r5, 0xc694d42685586125, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_I_TEI={0x8}, @GTPA_O_TEI={0x8}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8}]}, 0x4c}}, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000080)={0x5, 0x7, 0x4, 0x1000, 0x8, {0x0, 0x2710}, {0x1, 0x8, 0x6b, 0x1, 0x4, 0x9, "20a6f95a"}, 0x9, 0x4, @fd, 0x6, 0x0, r1}) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc0014}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x600000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x700000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2039.026005][ T6040] Dev loop4: unable to read RDB block 4 [ 2039.043825][ T6040] loop4: unable to read partition table [ 2039.054429][ T27] audit: type=1326 audit(1588653756.419:19488): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x40000 04:42:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50002}]}) 04:42:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x6}, {0x6}]}) [ 2039.114007][ T6040] loop4: partition table beyond EOD, truncated [ 2039.149369][ T6040] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2039.183112][ T27] audit: type=1326 audit(1588653756.419:19487): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6013 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:36 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x2, 0x0, &(0x7f0000ffa000/0x4000)=nil}) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x1e2) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f00000000c0)="f056fcccf07e02a2f3e5e29439e0c2cf60c7af8ef49425aeed390982552f49c82b150509b3eb3ae7fb0c158a738e02d103ff1cfebd1d086f1843dd41d669863c894be9bb19880ed4fd324aa0dd17c8781d095ce4d99b6113d08218460ae666ea3e63e8268bba2597bfabe9ee5f81c71599e5b7ea3ee4b26706171389ad2e2a8eb0ed37097dd59be0a0bb1b89cd36d9467fa36d29ee875361e2ec180a404c2ac052b496ac018396c9e96143d7594ab70b59b7f50e37b957e8058148f6a67b7ecc842275d2d8c949d96d421367eb0f3c70f18fc57fa4f6fd3998e434a1dfd0343da5df16cc58796e68df6ad0c1cb933fec008503f3c00edef6517529114a3c42484c211e0d7667ee22b0e02ab6e35dbe4a6fc638a9a68bd75aae242c012f5476fa11ad1f73bf4a3f1aa68025e1e5fd2406e6655d563dd875a91b821acadc7cff2a028ddce5ab770d2be9fa8695dd14ad547c0c7441b853c83e6f99e0c77886f5c02bcb8a4b5cf34905dd5fe946b6d86916535eceeed8b41f54506ea040f63657b80bf81440f8ca948af1403c23931cb17b6f1a617fbc943fc6679d5631fdd4bffc0e4f18de391bc2d33c389af015282c2458b54347e2e37a34a98a586e0bea839546cb01af88811d302ef32945d2b3e03557983ec3ce6a53be0484fc79270d33a631a567c22a3578b234e36fd9c194331bf2a333c8aad4022a660236aeadf5bd933a050c5fa9d80ce008d2afee85c4fb41af15a7194753ca13b9d2f34eba2296803a9f7f7a9733d109cce1acebf1bb200a5eac52cf40a41e6e44947e57d2b61589ba8f227199e6141c81e6b43075b61d9d49d7452ab0e142e0d9a8ffa31b1cc59daa79d865c0bbf6bb23512e19a73a555687db5a7fdf81a2373fe6e13e7600a0942b596782da139b1b6065f813cff8085ab728f7d15d0139accece82138d1a593bc659d67a07cb693cf9b23e3449c54ddd056a34f27a9a2f9255547fa5d77c136a8741dbce01087b39df9279b8efd3001c7bfdb63f943ae92448427cd673fd4191238fa1bc986a4bf4791f0dcab00153b3499ece564a7d965a9f4deeb026eb5486cf894f344b419eeb8ca9da8ff96501174a3014431900c0116150c9556903907f6325e880e2902c3856cd39de5df793870fff1f2471956d6aed00838bbb26f8c6e97578ab49af0dfed8145549ea11a3160ebd82e37f77dc6692abf8ff6cb7fe69bf67e4bb929f03f3c1045ee301d9663464e3227ff19715a5e050525d6e1e356603a74f1aca1f9c48b764c7c63c9a0687f988afa55a50bcb69e7b2fd590ce230be8930da3496b2c23a754635f273b6fd6473b9a8fcecf09d9d6da79b6ba3e8679a990b690e6c3a00cf23f9b367d409266c85530b483215dcba780d26fef478b0b158f3eaf0a28c5da64846610f32578b1ab840e5e51d831b291d0510b9e70fd6203627c07720d51d2933a3d03d8520fad3b13d03218c5754776e418e57a7cfb47e34be09cc53731ef058b969b084a38e718a2e8b6ea364e31bc534761eb919dc42c77c24a59ea48a14e5dda4420ee41eb691c3d23804bd973010fc3033fa8a5dd1b1a1d2cbb8b57e53841997dc368f9ae7e66812b0e5cb2bdc5b45219059759a0d4e45ebab2c2a0e2868d3b44188e299413567790bee98ee1dd35bc9a7d5223c1171cf9488b6f6c3e9d53aba58bad6b6ce22dbdbe848b4c06cca7f87e7cecd91a4f1fa15b4ac48b2d2a04f321f110940e540410951288fae0f2d37e11361ed5bdbf30d70ac71e3dbe30a094a168f7a142340d609cb044d493a9e697f42b4c603f0a82ff1629bb152a64d0049bd1eb4e03cc3754f6a2a1a0a72713df147fecbd97ef16e1d23a93ff55d9ef9c08b97a997645998b74d6ae5b7931816209994adb5b77b95f8121362ac851ca1df7623f45e762face0dc7f045e7ee3c0d003075741074b95189641e37661ddb9ebd6940bfef0d2f5e372d7b9db9360296038054e75dd367e764bc3b95088aff92b010991e69a0f408cf4f1f2d8ee20918f76a1154130a8b02c03fcbe766f6337fa6ac2068327f99ff78c068d5fee99552185c8a172bd4c7e94f5d887f0d0b2b8af958e2213dfd729f92f360696c7d7d626240267698b5a31edab5aed1b245ba9abaac3da6ce456ed5325a84d5db396076246f8b038ad642b0a907dd687ce80d46bf2f9a23a87ba512cee63394eb04de86bfd95864f89382c83bba43ae92e6c2495d55115285ec1fcb65f3985ea7d5ac5f8c4f4486ae058348959c9b89bffe9792552f11fb87e08518b15953e8bc98a3d6bb685fa14849df02401a19c3d9222b40e6534023b02445eb694ed965ad4a36c118396488a23beecc236e5e6aa245cc9e9f4db93cff00bb1ed29b0a6d525bd1607e41ae5d4be0623e62ba97c17bebbd4e38e6abfcbe3047af820c193fe976b936be4f51fe834d9cc6ba04184d0e3f821316805638969155f3f8ac0f4544c15e459090b183f6225b2c51559442f0f9b9c17bf06abb8aef2c33dcc3438fafe80154170cd0febdeb3fb761a2c7c2732ee40502d2dbf8e6b89400343553e33423e08cc2ab09b472c81c005c927160bff0f8ff77cf6e66b9fca418dac4b523a06565d4807b2acf11b6c429928331568f476a4dc784f187babb661ff9d9712f33a6968bbea28f51050ae09c426d6e7e4c8d9d3ea8a7b6636e809ed6a5e2bac0eaec0140bfd210d712c6061726fc4e2f3f9de73e7b93d2dacd3cc762a2d2c9d89b24a7d637ea2915b3b9603c3f08c5d3be1d79c9c2be8695c046ae6f0652ff7fafb8f9bd7eae5bbc717781d013a0447f5dc41476a0ff0e410cb3acd4f336a1d18411d686946a67b40bfd79baaf334218d044540e5529af1a23ea2b2a7b71822225f911b02c8c457dc515f1ed73a8abaa85e268a8003875027d57eab877c977c5ab0981fd628ce906ccada1e45dbcb461ef60aedae4a5cc47b1e467aef3bdfcdedd3c525a409e45071b5d1a7ece889567685b001f80bd21f915808cf68416590c8fefbe8ebd53877b5efc6c0f27d641ed1840ed55bb59c538ccaa1cae82750159832b135c18000caef7f148da90e8904ca7ad365e96d12596c431916b0bbe5af505ebfd748ebf1981e051855cfe3e5c89d633b6fd0549e5b0f639d1129692f0826c61f335322260cfdf9f48ef8a1f16d8a1dbf8df10bed10be0b662ea1fed06f2ca94862db00488b17dfa7fcf4252a0441750af75d34ea767b4c71b4b55baa19474a2a5d34f0487fbfb86288de51233fe0ee2484a96d78904ad0cc574fa8ce894203f1926f75236f8501a1da5bc8f1686052e1c987db8c57f9822a199906d02f9224da53e6b9628c3690d10b80487ffecd796fecd4baa59d0f64891f741121845506ab0182c50bbdee45438ed984bd9cc3b74f4c061994b6e33f3fda0457aba7611f9ccb001c40e3800e9ab7940f4d5c14a7b2b8b2b8666c6ab9b0a229e450b31b20c81b6dac0a0374c885a24ee3c14e93c6f39c4f87f47d43c46707e36706e8f306dbe759f959aebbad6d5137f04113d0f099f9bdce885cf4f7e76eed144e000c4a21cb7b22095e3d2e6cd89e66d1c468fb2d201c083df56ee445c22a20c2a3c68be26e660fd635a2115035a541b8d5fb1ed6b6791d69a4741aaf62fe0e491e2b6089fc6f9f194fb7b2fddd8153e0b465935b6b926069342acfcee10db5e619b97dbb4b003e56dd07d12dc50cdd285d23e775bfb681ab14cad94388c2a86aa24e6e9472b5a91271fe5e836049fedbd9d27b812b150a1533935ce0cafb6101184d5bc71564d4ba0171bd5d75b5dfadca9d6bfd3b155ce0bc01c67989f363dd2b3fe9cd66b2a718e8223c519d8ab34ad748cb22c0274fcb9b5b7d87fdf3b4849a4d9fbfef7187ffba6d0a8569755785d86cf1ec27ace65cd6796d7845789815e94682366b79ce9977cc0985806d6619187adfb01b289d7b659146351d947416222318d2661c1da04bfa773a15b61fe95016f1fbb2b3045ae5a93f3279aed459ef9c1a5229e8af2a57ae78a99804ef6bc33beaee7b084cafd75b1de19fdc51b31d5dae06366beafb8103c2ccc31627ca278eb465188feaa4d2198985e320b6e67fa75e34aabffef15acd2d6221d9f5d85b9062e33dd03e495d52cab5c31918881dedd40df0903869aa4545374c93fcd9616b3f254ef0f13cb393abd6e68c860f3fef67cfe3e487d9174cd2d209c273529a94afd6a2215844185cbb5bc5bebc379fede3dca595330db9d0aefc5182a14158419cdbc5f9063ed2f99cd499b1210ef6e7f9ccec33edc9dcd504250c54b5f42a81093af923e02af4317cabbf64ce29243932fb2dc722a0f03e26f8840165c2b9f916a511ee009ae410618f2d7cbd08dc66e2e945bc0ca3169306907a69efe83ae036141ff870fc1f5f85d786ac52ff781d6da669ad11aadcf5c7f67006be261c087ade124e99d05a655994f6e3d8db80b36112db18662056e379cf3b24d98cd18e7e14adc819a365757c905030131403bc1a6f42ccf97df1004098371709ccedb1393fa061096c947a143634f28a0682ef268a358d47ce4484b160d3b3a4e33317651776659f9c93e0905ba4b23d15910929228c4b33da3276d02b95c48a861a1b7f0ee1bfaa669116c179f7c283c99eb418b240aab317b09047028a795eeb9c62e534e23914a9cba34e8e187021d134045e6ffd903cd85d20831a3662afa571ef6bf3126d92ce0c6db614ec3895f01049b90626a9edcb07fea5cb0485028565de431a863c08e32c840b5c09027fd93ecd16918dde81f8c828e50644ecb56b6a57dd78cf0728874c233ad58ae42ce05934dae0ea3feee5dad1af6f4b06dd38e282af23d5df734bc99615e36e1f8eb928fbd097fd4ce27141de1f04954fabe64feeaa95779f7cc0c90ef1e07498da172a8bb77fab8b5c8a705746d75c6cbcb19537544f1a202219e7ce0a94919a9a248a815c0fc77556ea69c142c2259a8a88a5f3ec66f2ba94813cfd2ca334ae4ca863ee296faf1a2954bbe64e0e1de49bf534cdd967a331d766ab5c772d8f10889edb0422c9196a122bf69e8558508bc2cc75d3eaf08155d45525088c58c8e29a4f9355bc1188456b4caeab6a17979d79ee41ad257eff2ce8c0b494d34f7c2583f97d6fab2f4e73f5e5b820a917b0cef6aa5a38080fb57e09762a34d4947b0315e9949d52fb4ff1a818b5631bbee6e0b6d6e97fe9fcceeadad2f64c50dcebf80fa99fd57bf4dfe28299ded026804d5e07b9995f0fe0906e4901d0c7b595b0f83f1403ad851432894a49c6910561e722cef62fa559d9be356bb6efc9fc3dcb25384d65065a3f67704078fd518d45c96b177ba30895f9c7e118cc6fd651a2f248be9e44b0633f33fc2885917d9563ca3e7b2a59ad2dc9d0a876bddec02c82f097fb1ee45b580ee4eb001beb6ccd5ad13403bbb6302ba93ea906b61c86fa2a0a8da153c59ef6674bc53016dc0524121d5378b45b0264adc132bc0c53602561da2b5708925a5f6619b2449960fba76db8db11205c62a48d68631dc19906bec187d2a02abeb897f5aff25656a6ad5f0af71ab887d900906558d2bfa4867b8807e78ce0c720927600a6aca5d2c1ac075551ee8d7587d2e00220e8d5af2dda2c3f82cd273676bff09dcf1257012ab5ddfa826653997bd126542b6b10967cf16690561413182b0a863419ad2b46889f393734986e2ad0142a300eeabc1a0f1334eb554824406783a09346ba626aaa7eeaf6e29e2efe7cff45dadea0ccf194836e0a0c9455a5b6112cc9553d32f715159") r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000010c0)={{0x3, 0x0, @descriptor="ff31e959360875f4"}, 0x48, [], "5064757a205f911d0566d0408a868c059fbec92747213b7fa9767f2a17e335676109bd67bc1f2a7e118fff5d829367e4169fc248f2bbdf78a8f04601e5f1f4d4aaf160e99a9294b8"}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2039.269407][ T27] audit: type=1326 audit(1588653756.619:19489): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6053 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x700100}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x1a2}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2039.460414][ T6061] Dev loop4: unable to read RDB block 4 [ 2039.466014][ T6061] loop4: unable to read partition table [ 2039.507265][ T6061] loop4: partition table beyond EOD, truncated [ 2039.558854][ T6061] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:37 executing program 4: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x610000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r6, 0xea93}, 0x8) r7 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x700200}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2039.763533][ T6071] Dev loop4: unable to read RDB block 4 [ 2039.770736][ T6071] loop4: unable to read partition table [ 2039.781850][ T6071] loop4: partition table beyond EOD, truncated [ 2039.806368][ T6071] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2039.938492][ T6080] Dev loop4: unable to read RDB block 4 [ 2039.947649][ T6080] loop4: unable to read partition table [ 2039.965222][ T6080] loop4: partition table beyond EOD, truncated [ 2039.979274][ T6080] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x2f2}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2040.054968][ T27] audit: type=1326 audit(1588653757.419:19490): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6053 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x700300}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50003}]}) 04:42:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7}, {0x6}]}) 04:42:37 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioprio_set$pid(0x0, r2, 0x2) [ 2040.110419][ T4115] Dev loop4: unable to read RDB block 4 [ 2040.124510][ T4115] loop4: unable to read partition table [ 2040.139135][ T4115] loop4: partition table beyond EOD, truncated [ 2040.200450][ T27] audit: type=1326 audit(1588653757.569:19491): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6086 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2040.260067][ T6092] Dev loop4: unable to read RDB block 4 [ 2040.277413][ T6092] loop4: unable to read partition table [ 2040.283994][ T6092] loop4: partition table beyond EOD, truncated [ 2040.297197][ T6092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x3fa}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x800000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x900000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x600}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xb00000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2041.000635][ T27] audit: type=1326 audit(1588653758.370:19492): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6086 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6}]}) 04:42:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50004}]}) 04:42:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x1000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2041.102083][ T27] audit: type=1326 audit(1588653758.470:19493): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6121 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x900}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:38 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, r1}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={r2, r5}) 04:42:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x2000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:40 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x4, 0x9d, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=""/157}, &(0x7f00000001c0)=0x78) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x4000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x2000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6}]}) 04:42:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50006}]}) [ 2043.240416][ T4115] Dev loop4: unable to read RDB block 4 [ 2043.246014][ T4115] loop4: unable to read partition table [ 2043.265660][ T4115] loop4: partition table beyond EOD, truncated [ 2043.290634][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 2043.290643][ T27] audit: type=1326 audit(1588653760.660:19495): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6148 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x6000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2043.510090][ T6158] Dev loop4: unable to read RDB block 4 [ 2043.515870][ T6158] loop4: unable to read partition table [ 2043.570681][ T6158] loop4: partition table beyond EOD, truncated [ 2043.615420][ T6158] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x3000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2043.729278][ T6164] Dev loop4: unable to read RDB block 4 [ 2043.735748][ T6164] loop4: unable to read partition table [ 2043.774562][ T6164] loop4: partition table beyond EOD, truncated [ 2043.825536][ T6164] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x9000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:41 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TIOCCONS(r1, 0x541d) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) [ 2044.097230][ T27] audit: type=1326 audit(1588653761.460:19496): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6148 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x15}, {0x6}]}) [ 2044.176314][ T6178] Dev loop4: unable to read RDB block 4 [ 2044.185581][ T6178] loop4: unable to read partition table 04:42:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50009}]}) 04:42:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x3f00}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2044.221466][ T6178] loop4: partition table beyond EOD, truncated 04:42:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x30000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2044.281002][ T6178] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2044.309532][ T27] audit: type=1326 audit(1588653761.680:19497): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6185 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:41 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) pidfd_send_signal(r3, 0x12, &(0x7f0000000080)={0x5, 0x40, 0x5}, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f00000023c0)) socket(0x2b, 0x80000, 0x0) 04:42:41 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) 04:42:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x4000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x3f000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2044.709760][ T6204] Dev loop4: unable to read RDB block 4 [ 2044.718722][ T6204] loop4: unable to read partition table [ 2044.727865][ T6204] loop4: partition table beyond EOD, truncated 04:42:42 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x2000) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x151) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000001) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="464575e739378248af023b", @ANYRES16=r4, @ANYBLOB="00012cbd7000fcdbdf2505007d0bff000100008000000000000c0004000163ffffffc9f454668384b3ff81100e2ead1bff3082763480dc8eba921ffeecc4bbd27cb1f744d7a2e722b79c3860"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x16) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="149fbfef18ff5a9de7fbda8ee1789761610ac200", @ANYRES16=r4, @ANYBLOB="200025bd7000fcdbdf2505000000"], 0x14}, 0x1, 0x0, 0x0, 0x4068080}, 0x8004) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:42:42 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) capset(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000040)={0xffffffc1, 0x5, 0xd8, 0x5, 0x1, 0x2}) [ 2044.822443][ T6204] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:42 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="1c0000002f00092fd22780258c6394fb012448b6ed960b5005000200", 0x1c}], 0x1}, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:42:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x40000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2045.049393][ T6224] Dev loop4: unable to read RDB block 4 [ 2045.055004][ T6224] loop4: unable to read partition table [ 2045.079011][ T6224] loop4: partition table beyond EOD, truncated [ 2045.090024][ T27] audit: type=1326 audit(1588653762.460:19498): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6185 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1c}, {0x6}]}) [ 2045.151286][ T6224] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5000f}]}) 04:42:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x5000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x5ffabfff}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2045.271920][ T27] audit: type=1326 audit(1588653762.640:19499): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6233 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2045.368937][ T6224] Dev loop4: unable to read RDB block 4 [ 2045.374903][ T6224] loop4: unable to read partition table 04:42:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x6000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2045.414305][ T6224] loop4: partition table beyond EOD, truncated [ 2045.461236][ T6224] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xa2010000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:42 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x400}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x7000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2045.709372][ T6253] Dev loop4: unable to read RDB block 4 [ 2045.715098][ T6253] loop4: unable to read partition table [ 2045.749321][ T6253] loop4: partition table beyond EOD, truncated 04:42:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xd2870400}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2045.798085][ T6253] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2045.959318][ T6262] Dev loop4: unable to read RDB block 4 [ 2045.972373][ T6262] loop4: unable to read partition table [ 2045.990830][ T6262] loop4: partition table beyond EOD, truncated [ 2046.017343][ T6262] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2046.069042][ T27] audit: type=1326 audit(1588653763.440:19500): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6233 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:45 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}) 04:42:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xf2020000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50010}]}) 04:42:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1d}, {0x6}]}) 04:42:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x9000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) wait4(r2, &(0x7f0000000000), 0x2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f0000000140)) [ 2047.941125][ T27] audit: type=1326 audit(1588653765.310:19501): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6276 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:45 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 04:42:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xfa030000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000000)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000040)=0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x15) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000080)=r6) r7 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:42:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xa000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xfc000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xa201}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0xffbffa5f}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x21}, {0x6}]}) 04:42:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50030}]}) [ 2048.769067][ T27] audit: type=1326 audit(1588653766.140:19502): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6276 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x2, 0x0, 0x0, 0x50000}]}) 04:42:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x24}, {0x6}]}) [ 2048.946195][ T27] audit: type=1326 audit(1588653766.310:19503): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6320 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2049.725049][ T27] audit: type=1326 audit(1588653767.091:19504): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6320 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:48 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) open$dir(&(0x7f0000000080)='./file0\x00', 0x40080, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x48c1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000000)=0x1000000, 0x4) 04:42:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xb000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x3, 0x0, 0x0, 0x50000}]}) [ 2051.012930][ T6333] Dev loop4: unable to read RDB block 4 [ 2051.019215][ T6333] loop4: unable to read partition table [ 2051.046344][ T6333] loop4: partition table beyond EOD, truncated [ 2051.061605][ T6333] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x25}, {0x6}]}) 04:42:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50031}]}) 04:42:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x4, 0x0, 0x0, 0x50000}]}) 04:42:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xf202}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:48 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) ioctl$FIONCLEX(r1, 0x5450) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:48 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000027c0)={r8}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r8, 0x5}, 0x8) linkat(r2, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00', 0x1000) [ 2051.253530][ T27] audit: type=1326 audit(1588653768.621:19505): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6347 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x5, 0x0, 0x0, 0x50000}]}) [ 2051.329788][ T6357] Dev loop4: unable to read RDB block 4 [ 2051.335551][ T6357] loop4: unable to read partition table 04:42:48 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:42:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xfa03}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2051.373546][ T6357] loop4: partition table beyond EOD, truncated [ 2051.400069][ T6357] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x7, 0x0, 0x0, 0x50000}]}) 04:42:48 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000000)={&(0x7f0000000080)="330c662c37f4f6a283a965d2dc2476e1eab7a8ca4c2fa9873cc2fd99fc3accf5538742a58c44e4c1821b5a4c6a432190bd1328a6889ff5eaff025ee3b37ba0da9a7554c1e1922c47b250", 0x4a, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r3, 0xc00464be, &(0x7f0000000100)={r4}) 04:42:49 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8004}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000300)=@known='trusted.overlay.redirect\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000002c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r5, 0xc06c4124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="b4010000", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="84000000", @ANYRES16=r6, @ANYBLOB="00012dbd7000ffdbdf251b0000000800010002000000440022800800050002000000080004000600000008000600020000000800010082de00000800821d6e62bb05d3414404000900000008000100ff01000008000200060000000800070081ffffff1c0022f0b3f17abec404870b922363800800060002000000080002002000000008000700ff0100df349fd5852f88065b9782016ce9cea18ac7bd"], 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x40000) socket$netlink(0x10, 0x3, 0x14) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x6) ioctl$KVM_SET_BOOT_CPU_ID(r7, 0xae78, &(0x7f0000000280)) [ 2051.669532][ T6373] Dev loop4: unable to read RDB block 4 [ 2051.676650][ T6373] loop4: unable to read partition table [ 2051.750715][ T6373] loop4: partition table beyond EOD, truncated [ 2051.769093][ T6373] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2051.908814][ T4115] Dev loop4: unable to read RDB block 4 [ 2051.914418][ T4115] loop4: unable to read partition table [ 2051.920234][ T4115] loop4: partition table beyond EOD, truncated [ 2051.927249][ T6381] Dev loop4: unable to read RDB block 4 [ 2051.933120][ T6381] loop4: unable to read partition table [ 2051.940458][ T6381] loop4: partition table beyond EOD, truncated [ 2051.957640][ T6381] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2052.042006][ T27] audit: type=1326 audit(1588653769.411:19506): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6347 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:49 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) 04:42:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50050}]}) 04:42:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x28}, {0x6}]}) 04:42:49 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xfc00}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xc, 0x0, 0x0, 0x50000}]}) 04:42:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2c}, {0x6}]}) 04:42:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xe, 0x0, 0x0, 0x50000}]}) 04:42:49 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x60) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2052.258429][ T6411] Dev loop4: unable to read RDB block 4 [ 2052.268596][ T6411] loop4: unable to read partition table [ 2052.282324][ T6411] loop4: partition table beyond EOD, truncated [ 2052.293516][ T6411] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x17000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2052.331979][ T27] audit: type=1326 audit(1588653769.701:19507): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6416 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2052.399556][ T6418] Dev loop4: unable to read RDB block 4 [ 2052.408624][ T6418] loop4: unable to read partition table 04:42:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) write$P9_RGETATTR(r1, &(0x7f00000000c0)={0xa0, 0x19, 0x1, {0x1148, {0x20, 0x2, 0x6}, 0x44, r4, r6, 0xfff, 0xa59f, 0x5, 0x3, 0x8, 0x1, 0x4dccbc8b, 0xffff, 0x7, 0x5, 0x5, 0x1, 0x7, 0xcdb, 0x7a66}}, 0xa0) r7 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r9 = dup(r8) setsockopt$bt_rfcomm_RFCOMM_LM(r9, 0x12, 0x3, 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r11 = dup(r10) setsockopt$bt_rfcomm_RFCOMM_LM(r11, 0x12, 0x3, 0x0, 0x0) renameat(r9, &(0x7f0000000000)='./file0\x00', r11, &(0x7f0000000040)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2052.467676][ T6418] loop4: partition table beyond EOD, truncated [ 2052.473899][ T6418] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:49 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x98, r4, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x401}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xeb0}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x41be4c7af8074d6c}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8044}, 0x80094) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x14, 0x0, 0x0, 0x50000}]}) [ 2052.743712][ T6439] Dev loop4: unable to read RDB block 4 [ 2052.756644][ T6439] loop4: unable to read partition table [ 2052.764031][ T6439] loop4: partition table beyond EOD, truncated [ 2052.771213][ T6439] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50060}]}) 04:42:50 executing program 1: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r0 = dup(0xffffffffffffffff) pipe(&(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf25020000000900010073797231000000001400021f64756d6d7930000000000400000000000900030073797a32000000000900030073797a31000000000900010073797a30000000000900010073797a3000000000"], 0x64}, 0x1, 0x0, 0x0, 0x891}, 0x4004081) eventfd2(0x6, 0x80800) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x1a, 0x2, 0xfc, 0x2, 0x0, 0x6, 0x3, 0x6, 0x3f, 0x6, 0x9, 0x3, 0x79, 0xe0}, 0xe) socket$inet6_udp(0xa, 0x2, 0x0) 04:42:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x9e19f}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x15, 0x0, 0x0, 0x50000}]}) 04:42:50 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) close(r6) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x42}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000027c0), &(0x7f0000002800)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000000)={r8, 0x4}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2053.119321][ T27] audit: type=1326 audit(1588653770.491:19508): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6416 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2053.168202][ T6459] Dev loop4: unable to read RDB block 4 [ 2053.175114][ T6459] loop4: unable to read partition table [ 2053.197630][ T6459] loop4: partition table beyond EOD, truncated 04:42:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2d}, {0x6}]}) 04:42:50 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0x10, 0x2, 0x15) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0d89fdc5cbdd041d8e825798707bed4dca14a7960f0f8ec8da78031c7660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c593df1dad05f5fb5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0xc000, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfff, 0x678c40) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x3]}, 0x5c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r7, 0xc038563b, &(0x7f0000000300)={0x0, 0x0, {0xf8, 0x4, 0xa, 0x3}}) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000ee07aef2251acc14726b00000400e580"], 0x34}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@local, 0x74, r4}) setxattr$security_evm(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00000000fdcce489f14b49549dff255d3464d61750f95381b445d055202950db6b78407379604a1dafe4b7b44948d421cf6220b090a19fd94446d7f793b7e827fab12832d53b0650fa4f14376f890969c75e50b90e148ff5a686271bc8ed44b594ff678e69298965c03c4a6a72dcca83a76cd1b0bdd70c329efdd3efd20253d3a98307f662082f29b86eaa6f23de127578b6df818d40cd44d3a5b405324fb029885357674d12e207e0b63108"], 0x4, 0x0) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="5d60c39bc1c3e3b9d1f43dd6d06d0cef3ab09a054a1498dbd8eda7a38cad2d061e772fa26ad482edaa316f74254b5dcb347a241e78c5615839c9a447fdc3e255d1892eebbdbcc4", 0x47, 0x8000000000000000}], 0x20, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0xfffffffffffffffd}) [ 2053.212940][ T6459] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x16, 0x0, 0x0, 0x50000}]}) 04:42:50 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) rt_sigpending(&(0x7f0000000000), 0x8) [ 2053.268958][ T27] audit: type=1326 audit(1588653770.641:19509): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6469 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2053.299283][ T6470] netlink: 40763 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2053.387624][ T6475] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x100000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2053.485181][ T27] audit: type=1326 audit(1588653770.851:19510): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6484 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2053.506605][ T6482] Dev loop4: unable to read RDB block 4 [ 2053.512470][ T6482] loop4: unable to read partition table [ 2053.539468][ T6482] loop4: partition table beyond EOD, truncated [ 2053.559798][ T6482] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2053.634566][ T6470] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x200000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2053.688287][ T6489] Dev loop4: unable to read RDB block 4 [ 2053.693892][ T6489] loop4: unable to read partition table [ 2053.708345][ T6489] loop4: partition table beyond EOD, truncated [ 2053.714523][ T6489] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2053.762970][ T4115] Dev loop4: unable to read RDB block 4 [ 2053.772532][ T4115] loop4: unable to read partition table 04:42:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000000)={0x4efdf4c17255045d, 0x0, {0x101, 0x0, 0x3ff, 0x1000}}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x80000004, 0x0, 0x40}, 0x0, 0x0, r1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x401) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2053.803205][ T4115] loop4: partition table beyond EOD, truncated 04:42:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50070}]}) 04:42:51 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) dup2(0xffffffffffffffff, r4) fchown(r1, r2, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000640)={'gre0\x00', 0xccf4, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = fcntl$getown(r6, 0x9) ptrace$cont(0xffffffffffffffff, r7, 0x4, 0x100000000) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000002c0)=[{&(0x7f00000000c0)="70587bf46219b91d6c49e152eb3412d4c48bb21d94e177a3857e2f7048aec1c0f72fe74e376ab41e0851e690a58135960cbdada15e3a74b187a55004d8096d3e49a349dfcd17d2582b10c251c95a57f794b466871fb541313e7a531748fe84779ec7db4c4df30a30b4111767e5a88099088646b02adc6d527e9da1da4dce14d335241ed521c071111a0b9fff3012dd7b1f7353666b51e755c0e965d3a14c1227e578fc7b", 0xa4}, {&(0x7f0000000180)="3316ab547f372e679cdedc826a4f54efea92e8234a8bda92c808f45d33b815ada7016b27e99ad7fa8f12d08bf0d2c3850736b4440aa375308cb3424a47470cd674bce87d514ba82554d908eca7906fa2390e208419d526bf5eab2bf2baf0e3debeb2e43c89de06dcf8aba2635a2218", 0x6f, 0x7fff}, {&(0x7f0000000200)="402c69fb57230563548f194c8a00543f50391955a29d17f096543231c66ab5697d88fbeb9654d30037efe025f74010804bca9bf0", 0x34, 0x1}, {&(0x7f0000000240)="839f60b928217ce34915762ad44c28552a0ec333670a35963bc0c1c33258249bff49d5014414", 0x26, 0x1ff}, {&(0x7f0000000280)="31e35a1e6847c76a4448553e51a45b4972f149fd", 0x14, 0x2}], 0x4018000, &(0x7f0000000740)=ANY=[@ANYBLOB="6e6f626172726965722c6e6f6c6172677472322c6d7470742c737569643d0000005e2feb33bebc6578892abad6932499707b22d56fc8152e82c02eb5a02ef211ce54b5515fa2c4d31cb2475dc92897743e0a06649c8d26c0f29f64866ed9c468a86ee77adf54513859f44154fcdb637df13f96b5769ca8ef230fb5774daa1f4a8d5c715d9f4878a4a1abca447f105c23e5d6b2883854defab45ec80b64e5761ddfb8034e98596598448e7e4aab8cf1580e51eae626c6e4ab6cddf7b802be1bee1434f86844e828a92de046769d766237c9556870834de97ea4015c7c169d0f087e0f49d854590d302f033a2d1c2f3ba21213a70ba11d4c29", @ANYRESDEC=r2, @ANYBLOB="29ad1163c080a3a185416acfa7a741253a970c75308f702e1f1b09a837f4612091c34215b3ba310d4ce6889c45d80de58b169ff94d9dff17b7cb7d72a75c9367cda7e878a3712b0eaa9c2721c3d687801130eeb00d10fb70823411b9340c78d3d276cbfce42fc34eb309909f4760a7e833a2cf828c7da70eef8e77e09466d112eecdf36052a7347444ac93ec5bb3a5a5e564122da107468ce9e029ed9677616e7b8b86c13e4eafc800e4d96c797fcd1f032d3ef909e7c4b387f9b34c53441b992e940f27925de747e2cfb6853903ffeeb5863991e27d0043ced02b9eabb5399818976f4e43495af1283f"]) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x300000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:51 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3869}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000010800000000000000000000ee00", @ANYRES32=0x0, @ANYBLOB="000000000000000008000400ebed97a83e0c7cd54dfcf242ef366f37e894891e77864283e2f1e5a04ac98b80252825fdc44629289af5e2e010d843848997d5da9d69b846a75b888a7f046a93891e8051431c85a0af3ee650e4c51901e44c9b75cd50392069f001a966bf9eb8cc83ff07ac6ceb5dd9d5d88592b3c58a0782810c2bf6ed77391f132b226d00c24c7c97caa749552a737e635d19ce767342994077", @ANYRES32=r5, @ANYBLOB="140003007465616d3000"/20], 0x3c}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@private2={0xfc, 0x2, [], 0x1}, @loopback, @mcast1, 0x2, 0x6, 0x81, 0x400, 0x3, 0x86000021, r5}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000000c0)={0x0, 0x0, {0x1, 0x0, 0x3, 0x0, 0xfff}, 0xfffffffe}) ptrace$cont(0x7, 0x0, 0x0, 0x0) r7 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6b062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x200}) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r9 = dup(r8) setsockopt$bt_rfcomm_RFCOMM_LM(r9, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r9, 0x40405515, &(0x7f0000000280)={0x2, 0x6, 0x2442, 0x3, '\x00', 0x8}) [ 2054.078438][ T27] audit: type=1326 audit(1588653771.451:19511): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6469 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x30}, {0x6}]}) [ 2054.170965][ T6519] xfs: Unknown parameter 'nobarrier' 04:42:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x34}, {0x6}]}) [ 2054.232978][ T6527] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2054.283944][ T27] audit: type=1326 audit(1588653771.651:19512): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6484 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x400000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x1c, 0x0, 0x0, 0x50000}]}) [ 2054.337792][ T6537] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x35}, {0x6}]}) [ 2054.401710][ T6519] Dev loop4: unable to read RDB block 4 [ 2054.407739][ T6519] loop4: unable to read partition table [ 2054.413590][ T6519] loop4: partition table beyond EOD, truncated 04:42:51 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59e13de66114b05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x0, 0xffffffffa050e45d}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x480) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000000240)="e18ea425834f9d2365d8981f2e655cc0cc6c8ac2f51f67b2d1029b6a3d1b452678710513a525631a64757ef6abf92ef9bf237f367ebc61e31bdb845730ebc01812a536d0c14bf9d42bfc25f9814e77ea46253a850eee3a94137f9ddbc15951466b72e5bbec39492169a038d27a3923d27a1cecf058bb3606c24fce650ec0e03d73bad2b126bd79bf6cfecfde19d1735fabdcb293d486bcfb3429e3c1d0877e8b7c2c12a3dfaa56817a027eeab721561c5d25e1dfb4a2d162f6dbb9ccebbc97afaa24450d887755ae0223") setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0x7f}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000080)) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000000c0)={r1, 0x2}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000200)) [ 2054.443148][ T6519] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2054.505087][ T6530] xfs: Unknown parameter 'nobarrier' [ 2054.517846][ T27] audit: type=1326 audit(1588653771.891:19513): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6541 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x500000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:52 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={r7, 0x2}, &(0x7f0000000100)=0x38) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000027c0)={r7}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x81, 0xfff, 0x5, 0xfffffe00, 0x7, 0x6, 0x1, 0x80000001, r7}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r8, 0x6, 0x30}, &(0x7f0000000140)=0xc) syz_read_part_table(0x0, 0xaaaaaaaaaaaab5a, &(0x7f0000000380)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}, {&(0x7f00000001c0)="402e30205adcaf258affbc42182658e51bc71bed0ded9e0c66ed64c0bd6ddf266995b02a1e72e739711cf9f02a63d18265409727e922d110c7b8d17638d2d3619bac482535229df6ef1139453603e595e89cb8eb2cd30ea7d9d7bdb0d716202f8c2af27c8ce8ed33ec584daa8cbcf572e99e5bb2920adca18c4c26eafff3330040e46c6c98d3332ccc9379196b26f211c176c34a8c610ebb7c8906baf4fe914d4974a91b842f2ea70681af7c58faf1f7bd4258c649a96e488f6708e2a1", 0x0, 0x1f}, {&(0x7f0000000280)="a1ac6d909420bc4db52cefc8a09bebf572ecd9473ec7f8b0dfda5c3751c0de6d75852eec420fee7ca9bd47a203ad0966390d53ed3e7c629e52cb0baacf02e7d4dec4ed3aa80866f7ab6d06ce031d0c160e38678027c1b10ea55bef6463e5bfc77b711bb24e840af713f64a8cd43a4fa338a7ff06c932e0182c3fa1c6108950b1d88ce60fce63d10eacdf9d20d26de97908785988b35153dbabec2ad9ae92bdbd7a8d2f0f0eb65f81434708b34690579b3fd1ae242fe0518fcce19d57c673dd6625e0bdae4f1aafc1b46afee3e7983597b006ed26c4f714db0fb1d94e355539e800fdca372994d88e545d8794", 0x0, 0x6c416029}]) 04:42:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50090}]}) 04:42:52 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x80581, 0x0, 0x0, 0x0, 0x0, 0x6969824d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x2, 0x14bb}}, 0x20, 0x0, 0x0) close(r0) 04:42:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x1d, 0x0, 0x0, 0x50000}]}) 04:42:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0x6, 0x3, 0x4, 0x20, 0x53, {0x0, 0xea60}, {0x5, 0x0, 0x8, 0xda, 0xc1, 0x6, "0f4a7e6c"}, 0x234, 0x4, @fd=r3, 0x1, 0x0, 0xffffffffffffffff}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='&)ppp1lowlan1\x00', r4}, 0x10) r7 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xc, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:42:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:42:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x21, 0x0, 0x0, 0x50000}]}) 04:42:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x600000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:52 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)={0x4000201f, 0x3f000002}) close(r1) [ 2055.320619][ T27] audit: type=1326 audit(1588653772.691:19514): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6541 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3c}, {0x6}]}) 04:42:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x24, 0x0, 0x0, 0x50000}]}) 04:42:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={{0x0, 0x0, 0x80}, "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", "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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) [ 2055.492723][ T27] audit: type=1326 audit(1588653772.861:19515): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x25, 0x0, 0x0, 0x50000}]}) 04:42:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x500a0}]}) 04:42:53 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)={0x4c, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010101}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="68008000", @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf25090000001c0001800800050003000000080009002300000008000900220000003800038005000800070000000600040000000000140006002001000000000000000000000000000108000300010000000800030001000000"], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000300)={0x2, 0x0, [{0x40, 0x2, 0x0, 0x0, @msi={0x7a, 0x2, 0x320, 0x7}}, {0x3, 0x1, 0x0, 0x0, @msi={0x0, 0x80002, 0x400, 0xec1}}]}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x5) epoll_create1(0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000180)={0x45fd, 0x4}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) sendto$llc(r8, &(0x7f0000000380)="242b96b63867669ba21fed3413e4d3b965615b7b462620a06e7fdd5829b22e94e54e34ebb11d3d12042262c88ef63e6dd30d74ff366435bcf879e67ccf8da03f3e7ba7812ea2944cef1abd188242e6dd6de019e1e3586bbb4e5477ca7efb3cec095a", 0x62, 0x2004814, &(0x7f0000000400)={0x1a, 0x0, 0x4, 0xc0, 0x6, 0x1, @multicast}, 0x10) 04:42:53 executing program 1: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getpriority(0x2, 0x0) 04:42:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x700000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x28, 0x0, 0x0, 0x50000}]}) 04:42:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 2055.958385][ T6626] Dev loop4: unable to read RDB block 4 [ 2055.970311][ T6626] loop4: unable to read partition table [ 2055.996076][ T6626] loop4: partition table beyond EOD, truncated [ 2056.032430][ T6626] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x2c, 0x0, 0x0, 0x50000}]}) [ 2056.128462][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2056.165448][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2056.180733][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2056.203647][ T6634] Dev loop4: unable to read RDB block 4 04:42:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x2d, 0x0, 0x0, 0x50000}]}) [ 2056.229810][ T6634] loop4: unable to read partition table [ 2056.239831][ T6634] loop4: partition table beyond EOD, truncated [ 2056.276023][ T27] audit: type=1326 audit(1588653773.641:19516): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2056.278610][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:42:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3d}, {0x6}]}) 04:42:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x700100}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x30, 0x0, 0x0, 0x50000}]}) [ 2056.334648][ T6634] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:53 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@l2tp={0x2, 0x0, @multicast2, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)="badfc9424c71f37b1b4aed356f4a1aea972828c664f88403c96682956eaef00d6bed3ff94b135233e93947cc88aa68768c142262", 0x34}, {&(0x7f0000000100)="cc35880f049d02467d4bf747a3ad631a2ab7ec", 0x13}, {&(0x7f0000000140)="f04f3b203bc5517a612a13ec76011a24215501105116b54627cc6b434a25830faefd24ad33d490060174a3fdb5ad6b8e6a6d7339ee340ff4a4d362027c", 0x3d}, {&(0x7f0000000180)="f1f263237504a66e1d0510f125fe8ca9f47923ce0519d4688b4b83db3b87a3913e36c4eceaaa88f788ea6b683f921cddaea4f8721d6708676916d6ec7492d83219", 0x41}], 0x4, &(0x7f0000000240)=[{0xd8, 0x84, 0x0, "84ec543eb0d41b8eecb97358f8b64bbc171f468f9a76e0a3fef726280c60367c3896f0986ccb84adee80f78c331076cabbc4d811b3481b947c3bd9e86580e18620831d43af474d9ec2f2caada0e6d3c7a258af6ec14f6403a7a950ba1b4103e34341da923cf61c3ab4cb96ae9b2aa4e834246d15d6623e76cbe933f745cbc9870cb9e15bc3cff552c03c467fdfd37a4a78fb4c0d4bcbaa0a28b86bcabfc8505c54467374ba199229c1390d8538e6bd2551040db86d9a00ee1cb29907dbfdd70d33e5ccc9e975e8d2"}, {0x28, 0x84, 0xfffffff7, "5695d8d9281bd3b617806efe76b0df15cff530cbbb8d"}], 0x100}, 0x80) [ 2056.422622][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2056.432777][ T27] audit: type=1326 audit(1588653773.811:19517): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6656 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2056.462635][ T6639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2056.687851][ T6665] Dev loop4: unable to read RDB block 4 [ 2056.693457][ T6665] loop4: unable to read partition table [ 2056.707815][ T6665] loop4: partition table beyond EOD, truncated 04:42:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x34, 0x0, 0x0, 0x50000}]}) 04:42:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x500b0}]}) 04:42:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x800000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:54 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe2(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001c00)}], 0x1) close(0xffffffffffffffff) openat$hwrng(0xffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "4ae662d6793ca5a2ae57e55ad34eff341767cdca"}, 0x15, 0x0) listen(r0, 0xb9) socket$inet6(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) close(0xffffffffffffffff) dup(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x7f, 0x5, 0xc0, 0x1, 0x1, 0x3f}, r2}}, 0x128) [ 2056.757172][ T6665] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2056.880046][ T6670] Dev loop4: unable to read RDB block 4 [ 2056.885637][ T6670] loop4: unable to read partition table [ 2056.935635][ T6670] loop4: partition table beyond EOD, truncated 04:42:54 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe2(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001c00)}], 0x1) close(0xffffffffffffffff) openat$hwrng(0xffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "4ae662d6793ca5a2ae57e55ad34eff341767cdca"}, 0x15, 0x0) listen(r0, 0xb9) socket$inet6(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) close(0xffffffffffffffff) dup(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "782ba9aceab9d42ccb70f21d49b1dee60d256c1cb6778fb1f645f9b176636d6c0e1923b5aef4613db1be01ae8938baacd46a8a5489bd0906edc508aa1c0444e0dd18ac80ff34b91e42eebfba98ccdb53c57266fb936e1fb7b7e3f9c9ef00e266bd8eaee9edc250bf03ee2243297ccbaeca21c61265bfaaeb91d66db05a976f3b295e9ef8ef7901f897ef83d08956bd85dd04ce0781a680956ff26f964ef0877f7996473c5212cf608fed6680211cdf762344046510617df171c4b3cdc2780a13ad0e7a46ed3e770fb4ba2ae95d30ab57243befe1d2c96615c6082f33974d86e265357753c55fd8c3ca6df1155e3c4d4c6e61c7bd2a72cac2cba6f965e4cf8b65", 0x0, 0x7f, 0x5, 0xc0, 0x1, 0x1, 0x3f}, r2}}, 0x128) 04:42:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x900000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2056.998656][ T6670] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x35, 0x0, 0x0, 0x50000}]}) 04:42:54 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x544de348, 0x441) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000440), &(0x7f0000000500)=0x4) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000100)="91e65541a799d8a7c81f22900357083df5c54740f27295b5da97c3b8c48e2ba2f53411679323c83470d9619c8f1845e6e4f0896ebc98d8d863b06ac64f82ebe2a716f715d9f6db4bc26fc29a2f4676ee54a5a02139bb3297b74883fbc436dc7ef2fae769de4cde18afb06946047ee47a3b13a1f65109848934eed6c305ac027541283a8666394d4417be5d5ca2a5118c50fac4cad387971d2e193d8d6f95943d83c06bce5004ff1148630946698637393ac75d6f06078f3bf049fdc7d36893b3e40d4b8eb6686d4b", 0xc8}, {&(0x7f0000000200)="8717013c037eac74d48c48a38537cd30315d4191c243d53dc9b70f8ea3dfd5f904acfcb366a613007ecee6a22b795b7ea4b01dc2642dd2ceb0a9352c3f65a54c1782cce99d5acf1c1a2d9244619e510a8df842e9241ba36a3fb310da9e1c44ae9aa4382104d40fa788efee4591e6d4d0980e014c7daf69dddded6c6df4674f6add1e4838369fbe353da5746cbbefc166e9c23ba6ac6a8c3c91b9a587b644a6c87a88f8465349adbfbf7a9295f9ac2bec422f6afec6015b97be3a0050d128f6e0a171a693d53de481e9f42789b247be67ad17bee61570943b9f5d0f7eb458e2e4d33b0bc03825b8e5d8e426673e88134d3c3dae52", 0xf4}, {&(0x7f0000000300)="813ecac9d7858db1854447b33b0dfd5d08979c0233185547b95f51d7ca8d60d2f3e849476135aff8073db696284fe794da4b8125a98e91fc88930b87fa8b74daf9cc47b85b8afe", 0x47}, {&(0x7f0000000380)="3548ddaf59ba79e5073f0e05678079032e033be8140aae32e922c3101c2bb296714ff754f471228b9947fc0bc4beee2e23f69d4312efba172674f9820a7a93c85ce5862bd23c440ef1176987f5fbf7fc3f1810ca1cf5ffddd77d1b35db11516940ca799c72b1cd2f044f5a624e085e", 0x6f}], 0x4, 0x0, 0x0, 0x20000000}, 0x4008800) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000540)={0x0, 0x8}, 0x8) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsopen(&(0x7f0000000480)='ubifs\x00', 0x1) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2057.078052][ T4115] Dev loop4: unable to read RDB block 4 [ 2057.084878][ T4115] loop4: unable to read partition table [ 2057.108839][ T4115] loop4: partition table beyond EOD, truncated [ 2057.238835][ T6699] Dev loop4: unable to read RDB block 4 [ 2057.245807][ T6699] loop4: unable to read partition table [ 2057.252975][ T6699] loop4: partition table beyond EOD, truncated [ 2057.260664][ T6699] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x44}, {0x6}]}) 04:42:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe2(0x0, 0x0) openat$hwrng(0xffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "4ae662d6793ca5a2ae57e55ad34eff341767cdca"}, 0x15, 0x3) listen(0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) r0 = dup(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0xc9d, 0x0, "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", 0x8, 0x0, 0x5, 0xc0}}}, 0x128) 04:42:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xa00000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x3c, 0x0, 0x0, 0x50000}]}) 04:42:54 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x8, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2057.413038][ T27] audit: type=1326 audit(1588653774.782:19518): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6711 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2057.557788][ T6720] Dev loop4: unable to read RDB block 4 [ 2057.566101][ T6720] loop4: unable to read partition table [ 2057.594231][ T6720] loop4: partition table beyond EOD, truncated [ 2057.641519][ T6720] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x500fc}]}) 04:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe2(0x0, 0x0) openat$hwrng(0xffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "4ae662d6793ca5a2ae57e55ad34eff341767cdca"}, 0x15, 0x3) listen(0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) r0 = dup(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r2, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0xc9d, 0x0, "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", 0x8, 0x0, 0x5, 0xc0}}}, 0x128) 04:42:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x3d, 0x0, 0x0, 0x50000}]}) 04:42:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xb00000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:55 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)=0x16) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000280)={@fixed={[], 0x12}, 0x3f, 0x40, 0x8, 0x0, 0x0, "bbbae82ae9ac2079d3981f7c025406e631841f6561b721d7965a9c8f093d60ba19ec78d4afc3c4fad7ee96bc7334c0c1829484f864f52b4751b7c0c00540d7809f6c44827cd40f13c9ac5d81fd5a3f3bc814d6f91ec53be432818ce075bfbb5968cff9678b89712982ddc258f3e58b13a60053face057dbc0044b77cd86951ce"}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6, 0x9}]) 04:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)=""/123, 0x7ffff000}], 0x27a, &(0x7f0000002f80)=[{&(0x7f0000000c00)=""/215, 0x7ffff000}], 0x1, 0x0) [ 2057.886275][ T6742] Dev loop4: unable to read RDB block 4 [ 2057.901878][ T6742] loop4: unable to read partition table 04:42:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x1000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2057.933317][ T6742] loop4: partition table beyond EOD, truncated [ 2057.948401][ T6742] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2058.213584][ T27] audit: type=1326 audit(1588653775.582:19519): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6711 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x45}, {0x6}]}) 04:42:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x44, 0x0, 0x0, 0x50000}]}) 04:42:55 executing program 4: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x2, 0x70bd29, 0x25dfdbfb}, 0x14}}, 0xc0c2) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'syzkaller0\x00', {'bond0\x00'}, 0xdb}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_RESERVED(r6, 0x5601, 0x0) [ 2058.329087][ T27] audit: type=1326 audit(1588653775.702:19520): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6759 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2058.406704][ T6760] Dev loop4: unable to read RDB block 4 [ 2058.413902][ T6760] loop4: unable to read partition table [ 2058.477868][ T6760] loop4: partition table beyond EOD, truncated [ 2058.532725][ T6760] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x45, 0x0, 0x0, 0x50000}]}) 04:42:56 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:42:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x502f2}]}) 04:42:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x2000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2058.761083][ T6772] Dev loop4: unable to read RDB block 4 [ 2058.767206][ T6772] loop4: unable to read partition table [ 2058.780166][ T6772] loop4: partition table beyond EOD, truncated [ 2058.794602][ T6772] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:56 executing program 1: 04:42:56 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x3, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:42:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x48, 0x0, 0x0, 0x50000}]}) 04:42:56 executing program 1: [ 2059.047118][ T6788] Dev loop4: unable to read RDB block 4 [ 2059.056446][ T6788] loop4: unable to read partition table [ 2059.086285][ T6788] loop4: partition table beyond EOD, truncated [ 2059.092647][ T6788] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:42:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x4000000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2059.127946][ T27] audit: type=1326 audit(1588653776.502:19521): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6759 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x48}, {0x6}]}) 04:42:56 executing program 1: 04:42:56 executing program 1: 04:42:56 executing program 4: getpid() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(0xffffffffffffffff, 0x5016, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x15) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ioprio_get$pid(0x2, r3) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast1, 0x4e24, 0x7, 0x4e24, 0x1, 0xa, 0x20, 0x80, 0x21}, {0x1, 0x4, 0x5, 0x0, 0x64, 0x0, 0x1}, {0x5, 0xfffffffffffff801, 0x1, 0x80}, 0x1f, 0x6e6bbe, 0x1, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0x33}, 0xa, @in6=@local, 0x0, 0x3, 0x2, 0x2, 0x7, 0x8, 0xb7}}, 0xe8) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, r4, r6}, 0xc) 04:42:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x4c, 0x0, 0x0, 0x50000}]}) 04:42:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50300}]}) 04:42:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4c}, {0x6}]}) 04:42:56 executing program 1: 04:42:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x6000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x4d, 0x0, 0x0, 0x50000}]}) [ 2059.651568][ T27] audit: type=1326 audit(1588653777.022:19522): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6817 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:57 executing program 1: 04:42:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x50, 0x0, 0x0, 0x50000}]}) 04:42:57 executing program 1: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x41275301, 0x0, 0x8000000, [0x0, 0x0, 0x20800]}) openat$nvram(0xffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 04:42:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 04:42:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x54, 0x0, 0x0, 0x50000}]}) [ 2060.447904][ T27] audit: type=1326 audit(1588653777.822:19523): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6817 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x5c, 0x0, 0x0, 0x50000}]}) 04:42:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x9000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:42:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) 04:42:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4d}, {0x6}]}) 04:42:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x503fa}]}) [ 2062.385032][ T27] audit: type=1326 audit(1588653779.752:19524): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6855 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:42:59 executing program 1: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100]}, 0x40) 04:42:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x60, 0x0, 0x0, 0x50000}]}) 04:42:59 executing program 4: getpid() r0 = gettid() ptrace$cont(0x7, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0x0, 0xd8, 0xff}, 0x4, 0x7, 0x8, 0x4, 0x0, r1, 0x7}) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$getsig(0x4202, r0, 0x5, &(0x7f0000000000)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000080), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x30000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x61, 0x0, 0x0, 0x50000}]}) 04:43:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x64, 0x0, 0x0, 0x50000}]}) 04:43:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2063.174824][ T27] audit: type=1326 audit(1588653780.542:19525): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6855 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x50}, {0x6}]}) 04:43:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50600}]}) 04:43:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6c, 0x0, 0x0, 0x50000}]}) 04:43:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x3f000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50900}]}) 04:43:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x54}, {0x6}]}) 04:43:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x74, 0x0, 0x0, 0x50000}]}) 04:43:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x40000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:03 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r4, @ANYBLOB="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"], 0x3c}}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r9, @ANYBLOB="140003007467616d300000000002000000000000"], 0x3c}}, 0x0) ioctl$sock_SIOCADDRT(r6, 0x890b, &(0x7f00000020c0)={0x0, @vsock={0x28, 0x0, 0x2711, @hyper}, @xdp={0x2c, 0xe, r9, 0x1e}, @nl=@kern={0x10, 0x0, 0x0, 0x100000}, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002080)='virt_wifi0\x00', 0x40, 0x286d, 0x7}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005d40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x35ee, @private2={0xfc, 0x2, [], 0x1}, 0x6}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000080)="2d4fd7ed5f3e6744e3b4c99023ab0d0361dbfca80989ccaed8", 0x19}, {&(0x7f00000000c0)="fdf28b07b9ca3b0754dc7ff413d063272d0226a5764991728d1f13625b25cb7f3506c24736f6c4e91e521caba17734e06a18059b2afdea9685ce1bcb794687a586658f4407d29af818abb5c462e8cf9a30296c8a699e70889a1a5bd0e390eb83b284eb", 0x63}, {&(0x7f0000000140)="a6d95a987e6845ee53f18d18319e020270088f349a03052a6299ee3fd1bd4b0f866a022aac2a843e1fc46a53b270399ebf20b7767e96a2dfa23455ad4986ef7bb330a4baf8d23c9a41f6fe9d7312dac2c9715f61cb7c41a689341d4bd94556a112792f9329c85cffa88ed59d31beb44d1a9b", 0x72}, {&(0x7f00000001c0)="8a52c4291aa3021c1c56aa26747c2e4affaa7baf5e95790c062b90793c8b7db9ddcb88550fb32a398a04f11c45634ebc4777d1f2a447197621c1b0ad58639886a17a3905c13d8e521ce6945b0a90b6671778e6f57c70b8ee6a27de1a45a4c129746c2c", 0x63}, {&(0x7f0000000240)="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", 0xfb}], 0x5, &(0x7f0000004400)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="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"/324, @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00'], 0x400}}, {{&(0x7f0000002140)={0xa, 0x4e22, 0x44, @private0={0xfc, 0x0, [], 0x1}, 0x1}, 0x1c, &(0x7f0000005c40)=[{&(0x7f0000002180)="e3ba6e6050d3703586bcb9b0967291e189fdc617b3529491e34ebe894be5003e6ac51f9b0bbd4fb18027ae36af38945a6a5f09a64de5e501b7cc6a8413be033cdfe06878c2d279bc5431f0a532e4169c606c126c9b393ab546003d725651667c2551d8528268ff377dedf589799eef13dca64eff9b44ff6dc55e9fbb2c6b555f4215ab339efe28f6b605fa5bfab864cf0189e440e52ed8fcd99793c6a74e414de2583ab58920be884213eaa4a6b45f2f2dcfc60407810624d1bd9822c38a8fc99112f1d33aa909bec171dcf20d734e6d267ec83d82cfdc", 0xd7}, {&(0x7f0000004800)="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", 0x1000}, {&(0x7f0000002280)="d418f8ed82182014297d15a76cf9e808802d69b6b81be694906dfa638d957ee08336a40de426491811dde3c622b7dac23ad8458b967af588e19ca181a3791d2df9e294d7bd5c0eb6a14d4501b6a5a8fb5a179308d598c8ff80672743abd0ce7f2138ed017e96b8bb879219752aedc49b33863f6ffbf4b002279e375b031f3db0106eb12c789fdb6f1597f8c0c2db9fa053fa33a2d37427b1fdb328906401c5b90d58c7fe0bf0ba513929df6a547dad29896f3c16aef0f6c54afbcc2f115c6be6aef299826ea6d9fc5bdae7ffa87251303bf0ec4bbd87bfad4cb862ce5d5c8394441f4ec508e02a", 0xe7}, {&(0x7f0000002380)="c3a27bfd8c0f0aa22a29129f9e4bc8f6bcbb2869352935615952adf6bd87c18070a9983c663e343050b1b73d2cbc61087db205ea40", 0x35}, {&(0x7f0000005800)="7e9b3927cf9956cf29a01931c38a9466eda011e42ac94d07522c7000c5a069535389f0acd32153144f9c0197d0bc2f46dc65b17a10541e756ffa91c77c0f74fd696818af9457691a5b2ccd17bc76114fbd011217d090599d28d8598662eb5c192f6adc98a0bd78dad20f41b5f8dfdb3ef41745014500e3dac5dbfaab289f5172600174a8e5dd29498081ba360c1672bd9e6e8d5dfd9fb62541808dc03d221c66a2388f2dde036ee78259fecfe751c416ae69981c353e473b09f9c75308ccfe02b8e8bd76a6293deb9e4df7f2f23d912b82437cd22d1b2ebd5311fc8c13359b97305944bebde97979684376a957", 0xed}, {&(0x7f0000005900)="4e33b357a8719f4b793eafc61bebaca478046b404af19caa337bbcbf114fdc45e0b1af9b34e0cc808021a264397b0993532b760802dcc67ca08759a64ba6570f6bd65ed1a87e776a31c3eeca7fa4d528335e7dd18f3ad1341ddcf37acffd3dddb42284ff4424c5647ee8c24bf73facb65da2275b2fe26e3c634a9034489cc3a2a4c6e4d1208159195c76885fe3f2c16f15b17354b8e64d28dc7b81a2a682b6e57a369a3ca76545518c2c5288b6", 0xad}, {&(0x7f00000059c0)="bf1c0545198431d09a6b6d525c70a85bd59d2c402f06a2a64285783c7ff7bf76422609738b4bd63ffccbd566f45cc632a58b5de528a3dd657b024ebcabff96582a8d33362366440d27a78faab59ca4d7aede493b8407e445a97aa0e18f06cda8", 0x60}, {&(0x7f0000005a40)="8d54044b874b22b100f657dc99f0358b2aed96a9fe7891d83f53566f2b0be892d9f0be159023fc1f2f73431d34bc65cb1453cad38338c9f18ed08108b06219cd1b596afee814c9ff5409b4d525d9ea9caa8ef0424fe722c7342c0feabb78ed4953989af4ef04981a85d68ca69a566e8652247deac068d44a55d4b2f0172c9572b7f37396a9b65d0e591c12389ed4c72c84a8d75cbd236d42fdb21b80204e92e62e931080a17d59430efec87e0c61d134d6d6722159a8f4f2d03db989d8c5b236cdfda7e075b5843b711b5a36b38d88284e746e259b1bf676fd", 0xd9}, {&(0x7f0000005b40)="2733193343c352ed5de736395bd31dbd34c7b7eb31d6da8b868eb467cccdd202460f3d0b273ef2ef669fa7498832541c7c11c8d90fcc9b3f55801276b9cdf5599482adac32542a81484b6f83ca7de581f16e87babff51e7b68a1208832640fdb4e8d002489fecc443cc6ae724969de2e56e31570758df8b67826c38f1b40b6584e2a442ae69c2a9a76caa3e1d8830854ca6d28887d33651b7511a7fd5300df1ff9c6cc76882eebf98a48c27b96fc2cc15ced8a661b366adec76ca4288dfef13b6bfd5299bbbe7a0b799917e812fa", 0xce}], 0x9, &(0x7f0000005d00)=[@dstopts={{0x38, 0x29, 0x37, {0x88, 0x3, [], [@enc_lim={0x4, 0x1, 0x7}, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0x1}]}}}], 0x38}}], 0x2, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2065.656360][ T27] audit: type=1326 audit(1588653783.032:19526): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6923 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2065.690958][ T6933] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 04:43:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x7c, 0x0, 0x0, 0x50000}]}) [ 2065.782738][ T6933] Dev loop4: unable to read RDB block 4 [ 2065.790998][ T6933] loop4: unable to read partition table [ 2065.820912][ T6933] loop4: partition table beyond EOD, truncated [ 2065.858675][ T6933] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x5ffabfff}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2065.922728][ T6933] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 04:43:03 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="380200120000022abd70e76a22cbc43a5dab0a903e5b8ef200fcdbdf25ffffffff000000000000000000000000000004d500003300e4000600ff01000000009329561a000000000001ac14140e0000000000000000000000004e22", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="00000000000000000000000000000001000004d43c000000ac1414bb00000000000000000000000005000000000000004000000000000000ff0f000000000000040000000000000005000000000000003f000000000000000200000000000000060000000000000001000080000000000700000000000000f10900000000000004000000000000000500000080000000ffff000028bd70000635000002000402910000000000000029011400626c616b6532732d3136302d78383600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8060000000200000fed9cf9273844ab45edd9b91f532427310ec92211bcddf02724000d7484dceac5c90cdc3c97faf81c6057a56671b21f9cb8cb2676e35468ec3a4e609792522ecfb1135f9212ba06a79a07f46b0af33399303b1c9b45142430766e7ba200af8f8ddc3760196e846119942feeb61d76cf6b0c6184a7338f2086167f597520352185161590cdf0ed8b7083cdfc8d9ac7141b4b108c27a9e0a1a3db85747889ea48ab6f8d7fad27a5bebdaec299e94e47ed88bf291b1b6bec88cc031daac149e9fe03bb0c2c40d11af45303c0432eca73117ed9d26c319a37599e6c9bfa9d000000"], 0x238}, 0x1, 0x0, 0x0, 0x840}, 0x4040000) [ 2066.149642][ T6960] Dev loop4: unable to read RDB block 4 [ 2066.155449][ T6960] loop4: unable to read partition table [ 2066.186343][ T6960] loop4: partition table beyond EOD, truncated [ 2066.199679][ T6960] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2066.346577][ T6966] Dev loop4: unable to read RDB block 4 [ 2066.352600][ T6966] loop4: unable to read partition table [ 2066.381149][ T6966] loop4: partition table beyond EOD, truncated [ 2066.422503][ T4115] Dev loop4: unable to read RDB block 4 [ 2066.429859][ T6966] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2066.439309][ T4115] loop4: unable to read partition table [ 2066.451441][ T4115] loop4: partition table beyond EOD, truncated 04:43:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50f00}]}) [ 2066.455926][ T27] audit: type=1326 audit(1588653783.823:19527): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6923 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x5c}, {0x6}]}) 04:43:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x84, 0x0, 0x0, 0x50000}]}) 04:43:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x9fe10900}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:03 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xd0, 0x28040) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) getgroups(0x2, &(0x7f0000000140)=[r3, r5]) ioctl$FBIO_WAITFORVSYNC(r2, 0x40044620, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x87, 0x0, 0x0, 0x50000}]}) 04:43:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2066.567751][ T27] audit: type=1326 audit(1588653783.943:19528): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6981 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x94, 0x0, 0x0, 0x50000}]}) [ 2066.722393][ T4115] Dev loop4: unable to read RDB block 4 [ 2066.731083][ T4115] loop4: unable to read partition table [ 2066.745624][ T4115] loop4: partition table beyond EOD, truncated [ 2066.757576][ T6997] Dev loop4: unable to read RDB block 4 [ 2066.763192][ T6997] loop4: unable to read partition table 04:43:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xa2010000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2066.774105][ T6997] loop4: partition table beyond EOD, truncated [ 2066.807765][ T6997] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2067.375205][ T27] audit: type=1326 audit(1588653784.743:19529): auid=0 uid=0 gid=0 ses=4 subj=_ pid=6981 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x52000}]}) 04:43:04 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000080)={0x8, {"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", 0x1000}}, 0x1006) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f0000000000)={0x753b, 0x7, [{0xc, 0x1}, {0xe}, {0x7, 0x1}, {0x4, 0x1}, {0xc}, {0x0, 0x1}, {0x5, 0x1}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000010c0), &(0x7f0000001100)=0x4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x9c, 0x0, 0x0, 0x50000}]}) 04:43:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xf2020000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x60}, {0x6}]}) 04:43:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x61}, {0x6}]}) [ 2067.581988][ T7037] Dev loop4: unable to read RDB block 4 [ 2067.599784][ T7037] loop4: unable to read partition table [ 2067.607039][ T7037] loop4: partition table beyond EOD, truncated 04:43:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x64}, {0x6}]}) 04:43:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xa4, 0x0, 0x0, 0x50000}]}) [ 2067.683810][ T7037] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xfa030000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2067.759806][ T27] audit: type=1326 audit(1588653785.133:19530): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7049 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x52fff}]}) 04:43:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:05 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x80000000400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x3}]) 04:43:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xac, 0x0, 0x0, 0x50000}]}) 04:43:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xfc000000}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xb1, 0x0, 0x0, 0x50000}]}) 04:43:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xc36, 0x0, 0x0, 0x50000}]}) [ 2068.447483][ T7076] Dev loop4: unable to read RDB block 4 [ 2068.453127][ T7076] loop4: unable to read partition table [ 2068.476878][ T7076] loop4: partition table beyond EOD, truncated [ 2068.485449][ T7076] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2068.573612][ T27] audit: type=1326 audit(1588653785.943:19531): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7049 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2068.606630][ T7092] Dev loop4: unable to read RDB block 4 [ 2068.612310][ T7092] loop4: unable to read partition table 04:43:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x6c}, {0x6}]}) 04:43:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0xffbffa5f}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) [ 2068.624878][ T7092] loop4: partition table beyond EOD, truncated [ 2068.655004][ T7092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2068.714889][ T27] audit: type=1326 audit(1588653786.083:19532): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7099 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x53000}]}) 04:43:06 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x90a41, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000080)={0x4, "a4bbd3bb390ac07e2765c31b15972647d0b8733ccbbc156cd8aa8c1f14e9b934", 0x0, 0x1}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7fffffff) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x15) r5 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r5, &(0x7f0000000480)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0xb385, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0x8}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000140)="ca1825738bf799b6e165ddbe6ed50c9c5adcaa3732a3cfa2875c3a6cde8ac84d27212341bd53b674f9be55e8eb8811ffdcc91a7e94dfbbe9ac47c56c85575a0bdea77eadd9bbca8c4a1a2221b38c3799b81d65c94c9ee45bad3cfab4940e481ff994680ae1b159c2a98cb9197ffd8fb09029c746e7fbd75fc73d5ea32fe08de4f73e750a2bd661e03bf7d1137a971864b407eaff6cc293a0065221e5dd5460e13d8a41b897f36302fe0e3626408216680acdca74af88ba42673fc5699c46591a81ec8d3c87432f002c7f3a156471decae9", 0xd1}, {&(0x7f0000000240)="99184ac307f530f78a1f9c074ed6df37238c715b15695b6cd80a62741d08757888c079858ef5eb734cf5c6b3d9d1d99696da608005d44e3a9584c318ff8d4b104582d863769fce0de0d6285e91f4da92a8bc78091a020d2272f819769fdb636b6602d633956e20ee9b2c24fd424c9f2b3e3fb56dd9ff2b2a3870b2cc778f40e000517c6a649d2e2e0dc92dd72308547e0040225a1896e831c9cc2a20786efa67877bfcef75e08d73c9da4c73aff184b791600f3ca499b0cdd8622364de0d19cc28", 0xc1}], 0x2, &(0x7f0000000380)=[@hopopts_2292={{0xf0, 0x29, 0x36, {0x89, 0x1a, [], [@generic={0xdd, 0x8c, "ae77cc69878efdb77fdcfdefe471d26b52ac559d9c147036b6d3f01f32a69a69b55050af42f8d3303f04e91b2d51c8453d2241782bcaabf42af9e57194bede4701468a782b2bb506c4081e1c0ae050dfd1dae3d9511fb9d738005d246c80154376ea6ba9e1669c091071b08f1ac4eba7cb39035ca70865157a33290cbe645c18b5ed07c3d81d50bc7eb7a76f"}, @pad1, @enc_lim={0x4, 0x1, 0x1}, @generic={0x2, 0x2f, "5c3b412d202423e20d7973d104360234ebcfdb225ef0ff427ce49c03cbd899075dd0415b9c041a6687b4ce3f8721cf"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x3}, @padn={0x1, 0x1, [0x0]}]}}}], 0xf0}}], 0x1, 0x4000) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)=r4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x2, 0x0, 0x0, 0x50000}]}) 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x3, 0x0, 0x0, 0x50000}]}) [ 2069.495742][ T27] audit: type=1326 audit(1588653786.863:19533): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7099 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x74}, {0x6}]}) 04:43:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x2, 0x0, 0x50000}]}) 04:43:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x4, 0x0, 0x0, 0x50000}]}) [ 2069.628235][ T27] audit: type=1326 audit(1588653787.003:19534): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7140 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x53100}]}) [ 2070.410808][ T27] audit: type=1326 audit(1588653787.783:19535): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7140 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x5, 0x0, 0x0, 0x50000}]}) 04:43:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x4, 0x0, 0x50000}]}) 04:43:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7c}, {0x6}]}) 04:43:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x53f00}]}) 04:43:09 executing program 4: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)={0x68, r3, 0x105, 0x0, 0x0, {{}, {0x0, 0x2}, {0xaf, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x10001}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4840) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f00000023c0)) 04:43:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2072.323458][ T27] audit: type=1326 audit(1588653789.693:19536): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7164 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x7, 0x0, 0x0, 0x50000}]}) 04:43:09 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x4}]) prctl$PR_SET_DUMPABLE(0x4, 0x0) 04:43:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x6, 0x0, 0x50000}]}) [ 2072.606590][ T7188] Dev loop4: unable to read RDB block 4 [ 2072.613536][ T7188] loop4: unable to read partition table [ 2072.626887][ T7188] loop4: partition table beyond EOD, truncated 04:43:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) [ 2072.658004][ T7188] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) [ 2072.846749][ T7193] Dev loop4: unable to read RDB block 4 [ 2072.860379][ T7193] loop4: unable to read partition table [ 2072.902991][ T7193] loop4: partition table beyond EOD, truncated [ 2072.948632][ T7193] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2073.126992][ T27] audit: type=1326 audit(1588653790.503:19537): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7164 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x54000}]}) 04:43:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0xc, 0x0, 0x0, 0x50000}]}) 04:43:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x9, 0x0, 0x50000}]}) 04:43:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:10 executing program 4: getpid() getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) socketpair(0x22, 0xa, 0xf6, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:43:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x84}, {0x6}]}) [ 2073.281704][ T27] audit: type=1326 audit(1588653790.653:19538): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7224 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r0, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) [ 2073.330373][ T7226] Dev loop4: unable to read RDB block 4 [ 2073.336836][ T7226] loop4: unable to read partition table [ 2073.391430][ T7226] loop4: partition table beyond EOD, truncated 04:43:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r0, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) [ 2073.451089][ T7226] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:11 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000000)=0x8) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x30, 0x0, 0x50000}]}) 04:43:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r0, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0xe, 0x0, 0x0, 0x50000}]}) [ 2073.728742][ T7245] Dev loop4: unable to read RDB block 4 [ 2073.764532][ T7245] loop4: unable to read partition table [ 2073.801175][ T7245] loop4: partition table beyond EOD, truncated [ 2073.813688][ T7245] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2073.896097][ T7255] Dev loop4: unable to read RDB block 4 [ 2073.901979][ T7255] loop4: unable to read partition table [ 2073.913886][ T7255] loop4: partition table beyond EOD, truncated [ 2073.923905][ T7255] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2074.088138][ T27] audit: type=1326 audit(1588653791.463:19539): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7224 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x55000}]}) 04:43:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x14, 0x0, 0x0, 0x50000}]}) 04:43:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x87}, {0x6}]}) 04:43:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0xfc, 0x0, 0x50000}]}) 04:43:11 executing program 4: getpid() r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x8, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x0, 0x110, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000000), {[{{@arp={@private=0xa010100, @rand_addr=0x64010102, 0xffffff00, 0x0, 0xd, 0xc, {@mac=@dev={[], 0x29}, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}}, 0x80, 0x1, 0xfff7, 0xdac6, 0x8000, 0x8000, 'veth1_virt_wifi\x00', 'hsr0\x00', {0xff}, {}, 0x0, 0x80}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @remote, @broadcast, 0x4, 0xffffffff}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="c91a311b4165", @mac, @multicast2, @broadcast, 0x1, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/mnt\x00') ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) [ 2074.208821][ T27] audit: type=1326 audit(1588653791.583:19540): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7266 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2074.286121][ T7273] Dev loop4: unable to read RDB block 4 [ 2074.292333][ T7273] loop4: unable to read partition table 04:43:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2074.372162][ T7273] loop4: partition table beyond EOD, truncated [ 2074.440472][ T7273] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x15, 0x0, 0x0, 0x50000}]}) 04:43:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x2, 0x50000}]}) [ 2075.002944][ T27] audit: type=1326 audit(1588653792.374:19541): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7266 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x56000}]}) 04:43:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x94}, {0x6}]}) 04:43:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x16, 0x0, 0x0, 0x50000}]}) 04:43:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2075.289408][ T27] audit: type=1326 audit(1588653792.664:19542): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7320 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2076.061641][ T27] audit: type=1326 audit(1588653793.434:19543): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7320 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:14 executing program 4: getpid() r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, &(0x7f0000000440)=""/239, 0xef, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000540)="b4f0986352f2fd38656a9c072b039d1847f759910051b2c5c9ed68f04b878a0b3d8f9bbd6bec58b0313c3afa0ec5d8f889a5a7e8ae88164ae3dc36cdb59ff8d3471ab8e3a550658f04d977d8634649316a5560d16bbb718e6da5a7af64aabe574ff402947ed7fcd9610f", 0x6a, 0xffffffffffffffff) keyctl$get_security(0x11, r2, &(0x7f0000000400)=""/31, 0x1f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1ef, 0x1}]) 04:43:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x1c, 0x0, 0x0, 0x50000}]}) 04:43:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x9c}, {0x6}]}) 04:43:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x4, 0x50000}]}) 04:43:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x57000}]}) 04:43:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xa4}, {0x6}]}) [ 2077.231279][ T4115] Dev loop4: unable to read RDB block 4 [ 2077.241393][ T4115] loop4: unable to read partition table [ 2077.254294][ T4115] loop4: partition table beyond EOD, truncated 04:43:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2077.382297][ T27] audit: type=1326 audit(1588653794.754:19544): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7343 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x1d, 0x0, 0x0, 0x50000}]}) 04:43:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x6, 0x50000}]}) 04:43:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2077.554904][ T7350] Dev loop4: unable to read RDB block 4 [ 2077.582059][ T7350] loop4: unable to read partition table [ 2077.608029][ T7350] loop4: partition table beyond EOD, truncated [ 2077.647660][ T7350] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2077.815901][ T7363] Dev loop4: unable to read RDB block 4 [ 2077.821544][ T7363] loop4: unable to read partition table [ 2077.845906][ T7363] loop4: partition table beyond EOD, truncated [ 2077.879286][ T7363] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:15 executing program 4: r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x100, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x401}, {&(0x7f0000000280)="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", 0x1e3, 0x1}]) ptrace$cont(0x7, r0, 0x0, 0x952) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0xdaaa3974249034f7}, 0x1) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x9, 0x50000}]}) 04:43:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x21, 0x0, 0x0, 0x50000}]}) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2078.145421][ T7380] Dev loop4: unable to read RDB block 4 [ 2078.151443][ T7380] loop4: unable to read partition table [ 2078.161397][ T7380] loop4: partition table beyond EOD, truncated [ 2078.170392][ T7380] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x59000}]}) [ 2078.180801][ T27] audit: type=1326 audit(1588653795.554:19545): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7343 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xac}, {0x6}]}) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x24, 0x0, 0x0, 0x50000}]}) 04:43:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x30, 0x50000}]}) [ 2078.295109][ T27] audit: type=1326 audit(1588653795.664:19546): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7400 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2078.325817][ T7388] Dev loop4: unable to read RDB block 4 [ 2078.331705][ T7388] loop4: unable to read partition table 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x25, 0x0, 0x0, 0x50000}]}) [ 2078.340179][ T7388] loop4: partition table beyond EOD, truncated [ 2078.358499][ T7388] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:15 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6}]) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) 04:43:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0xfc, 0x50000}]}) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2078.622500][ T7417] Dev loop4: unable to read RDB block 4 [ 2078.628489][ T7417] loop4: unable to read partition table [ 2078.642287][ T7417] loop4: partition table beyond EOD, truncated [ 2078.653454][ T7417] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2078.825805][ T4115] Dev loop4: unable to read RDB block 4 [ 2078.831630][ T4115] loop4: unable to read partition table [ 2078.847058][ T4115] loop4: partition table beyond EOD, truncated [ 2078.854535][ T7424] Dev loop4: unable to read RDB block 4 [ 2078.860113][ T7424] loop4: unable to read partition table [ 2078.874526][ T7424] loop4: partition table beyond EOD, truncated [ 2078.896514][ T7424] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5a000}]}) [ 2079.092379][ T27] audit: type=1326 audit(1588653796.464:19547): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7400 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xb1}, {0x6}]}) 04:43:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x28, 0x0, 0x0, 0x50000}]}) 04:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50002}]}) 04:43:16 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000000)='net/mcfilter6\x00') 04:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) [ 2079.248509][ T7449] Dev loop4: unable to read RDB block 4 [ 2079.254224][ T7449] loop4: unable to read partition table [ 2079.279270][ T7449] loop4: partition table beyond EOD, truncated 04:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2079.332318][ T7449] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2079.357631][ T27] audit: type=1326 audit(1588653796.734:19548): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7460 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x2c, 0x0, 0x0, 0x50000}]}) 04:43:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5b000}]}) 04:43:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x2d, 0x0, 0x0, 0x50000}]}) 04:43:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50004}]}) [ 2080.171683][ T27] audit: type=1326 audit(1588653797.544:19549): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7460 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:19 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x1, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x2}, {0x6}]}) 04:43:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x30, 0x0, 0x0, 0x50000}]}) 04:43:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5f202}]}) 04:43:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50006}]}) [ 2082.226029][ T4115] Dev loop4: unable to read RDB block 4 [ 2082.235524][ T4115] loop4: unable to read partition table [ 2082.255729][ T4115] loop4: partition table beyond EOD, truncated 04:43:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2082.275763][ T27] audit: type=1326 audit(1588653799.654:19550): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7501 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2082.415068][ T4115] Dev loop4: unable to read RDB block 4 [ 2082.433486][ T4115] loop4: unable to read partition table [ 2082.449027][ T4115] loop4: partition table beyond EOD, truncated 04:43:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x34, 0x0, 0x0, 0x50000}]}) 04:43:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2082.467109][ T7514] Dev loop4: unable to read RDB block 4 [ 2082.481678][ T7514] loop4: unable to read partition table [ 2082.500664][ T7514] loop4: partition table beyond EOD, truncated [ 2082.532099][ T7514] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2082.674618][ T7525] Dev loop4: unable to read RDB block 4 [ 2082.681464][ T7525] loop4: unable to read partition table [ 2082.705496][ T7525] loop4: partition table beyond EOD, truncated [ 2082.737446][ T7525] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:20 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_NO_NEW_PRIVS(0x27) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x100}, @mss={0x2, 0x23f}, @sack_perm, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0xff}, @sack_perm], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f00000000c0)="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", 0x1d6, 0x1}]) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2083.044669][ T7543] Dev loop4: unable to read RDB block 4 [ 2083.061639][ T7543] loop4: unable to read partition table 04:43:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x3}, {0x6}]}) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2083.087761][ T27] audit: type=1326 audit(1588653800.465:19551): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7501 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2083.111431][ T7543] loop4: partition table beyond EOD, truncated [ 2083.118478][ T7543] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5fa03}]}) 04:43:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50009}]}) 04:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x35, 0x0, 0x0, 0x50000}]}) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2083.180415][ T27] audit: type=1326 audit(1588653800.535:19552): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7553 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:20 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000000)) 04:43:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x3c, 0x0, 0x0, 0x50000}]}) 04:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x3d, 0x0, 0x0, 0x50000}]}) [ 2083.347638][ T7563] Dev loop4: unable to read RDB block 4 [ 2083.353337][ T7563] loop4: unable to read partition table 04:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x44, 0x0, 0x0, 0x50000}]}) [ 2083.396260][ T7563] loop4: partition table beyond EOD, truncated 04:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x45, 0x0, 0x0, 0x50000}]}) [ 2083.440647][ T7563] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2083.614615][ T7570] Dev loop4: unable to read RDB block 4 [ 2083.620218][ T7570] loop4: unable to read partition table [ 2083.645752][ T7570] loop4: partition table beyond EOD, truncated [ 2083.656822][ T7570] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2083.961328][ T27] audit: type=1326 audit(1588653801.335:19553): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7553 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x4}, {0x6}]}) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5fc00}]}) [ 2084.109560][ T27] audit: type=1326 audit(1588653801.485:19554): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7597 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50010}]}) 04:43:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x48, 0x0, 0x0, 0x50000}]}) 04:43:21 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2084.300523][ T7606] Dev loop4: unable to read RDB block 4 [ 2084.308814][ T7606] loop4: unable to read partition table 04:43:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x4c, 0x0, 0x0, 0x50000}]}) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2084.353936][ T7606] loop4: partition table beyond EOD, truncated [ 2084.382376][ T7606] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2084.569427][ T7622] Dev loop4: unable to read RDB block 4 [ 2084.576554][ T7622] loop4: unable to read partition table [ 2084.616006][ T7622] loop4: partition table beyond EOD, truncated [ 2084.641253][ T7622] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x5}, {0x6}]}) 04:43:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2084.897954][ T27] audit: type=1326 audit(1588653802.275:19555): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7597 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2085.004755][ T27] audit: type=1326 audit(1588653802.385:19556): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7638 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x5ff2f}]}) 04:43:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50030}]}) 04:43:22 executing program 4: getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) socket$netlink(0x10, 0x3, 0xa) 04:43:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x4d, 0x0, 0x0, 0x50000}]}) 04:43:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2085.255584][ T7648] Dev loop4: unable to read RDB block 4 [ 2085.261317][ T7648] loop4: unable to read partition table 04:43:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x50, 0x0, 0x0, 0x50000}]}) [ 2085.308415][ T7648] loop4: partition table beyond EOD, truncated [ 2085.367307][ T7648] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2085.534275][ T7654] Dev loop4: unable to read RDB block 4 [ 2085.557089][ T7654] loop4: unable to read partition table [ 2085.575270][ T7654] loop4: partition table beyond EOD, truncated 04:43:23 executing program 4: getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000000c0)={0xa10000, 0x5bb4cc0d, 0x401, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x0, 0x5, [], @p_u16=&(0x7f0000000000)=0x200}}) connect$tipc(r4, &(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) [ 2085.582238][ T7654] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2085.798254][ T7677] Dev loop4: unable to read RDB block 4 [ 2085.806233][ T7677] loop4: unable to read partition table [ 2085.812622][ T27] audit: type=1326 audit(1588653803.185:19557): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7638 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2085.835655][ T7677] loop4: partition table beyond EOD, truncated 04:43:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x6}, {0x6}]}) 04:43:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x54, 0x0, 0x0, 0x50000}]}) [ 2085.856770][ T7677] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2085.899091][ T4115] Dev loop4: unable to read RDB block 4 [ 2085.917695][ T4115] loop4: unable to read partition table 04:43:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x87000}]}) [ 2085.940172][ T27] audit: type=1326 audit(1588653803.315:19558): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7683 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2085.951582][ T4115] loop4: partition table beyond EOD, truncated [ 2085.998808][ T27] audit: type=1326 audit(1588653803.375:19559): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7687 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x80000 04:43:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50050}]}) 04:43:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x5c, 0x0, 0x0, 0x50000}]}) 04:43:23 executing program 4: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @broadcast}, {0x6, @broadcast}, 0x44, {0x2, 0x4e21, @multicast1}, 'vlan1\x00'}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x60, 0x0, 0x0, 0x50000}]}) [ 2086.250102][ T7698] Dev loop4: unable to read RDB block 4 [ 2086.259720][ T7698] loop4: unable to read partition table [ 2086.279209][ T7698] loop4: partition table beyond EOD, truncated 04:43:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2086.313184][ T7698] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x61, 0x0, 0x0, 0x50000}]}) 04:43:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2086.475025][ T7712] Dev loop4: unable to read RDB block 4 [ 2086.481815][ T7712] loop4: unable to read partition table [ 2086.521484][ T7712] loop4: partition table beyond EOD, truncated [ 2086.551979][ T7712] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2086.681863][ T4115] Dev loop4: unable to read RDB block 4 [ 2086.692260][ T4115] loop4: unable to read partition table [ 2086.715029][ T4115] loop4: partition table beyond EOD, truncated [ 2086.745211][ T27] audit: type=1326 audit(1588653804.125:19560): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7683 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x7}, {0x6}]}) 04:43:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x4000000}]}) 04:43:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50060}]}) 04:43:24 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6d643000942b671e08aca11c80e029de66820934263029dbe1999541cbbfbab6b2bc5bcb6d04ccd0bae1c8a1e32c91e7b0470999fd2c57716325de827d7528e3ec51ea9f8892c8b0b08ba5ffc1025012aa7fbfa60501c8"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='qnx4\x00', 0x2000040, &(0x7f0000000100)=':\x00') 04:43:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x64, 0x0, 0x0, 0x50000}]}) 04:43:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6c, 0x0, 0x0, 0x50000}]}) [ 2087.197228][ T7743] Dev loop4: unable to read RDB block 4 [ 2087.216997][ T7743] loop4: unable to read partition table [ 2087.235146][ T7743] loop4: partition table beyond EOD, truncated 04:43:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2087.248724][ T7743] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:24 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6, 0x40000010001}]) 04:43:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x8}, {0x6}]}) 04:43:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x74, 0x0, 0x0, 0x50000}]}) 04:43:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50070}]}) 04:43:25 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x25, &(0x7f00000023c0)=[{0x0, 0x0, 0x7f}, {&(0x7f0000000080)="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", 0x1d6, 0x1}]) 04:43:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000200)={"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"}) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f00000000c0)={0x6, {{0xa, 0x4e23, 0x0, @mcast1, 0xfffffffc}}, {{0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x7}}}, 0x108) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r4, 0xc01c64ad, &(0x7f0000000000)={0x4, 0x9, 0xffffffff, 0x3ff, 0x81, 0x800000, 0xffffffe0}) 04:43:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x7c, 0x0, 0x0, 0x50000}]}) 04:43:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) 04:43:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:25 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x26e200, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000ff7000/0x8000)=nil}) 04:43:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="220000000300000000000000000000000000000000e582904fa8ce8294f3334d2d40d124a07a227861022a2ca9b4efbc712687"], 0x22) 04:43:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x9}, {0x6}]}) 04:43:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x84, 0x0, 0x0, 0x50000}]}) [ 2088.519962][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 2088.519970][ T27] audit: type=1326 audit(1588653805.895:19567): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7778 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2088.645930][ T27] audit: type=1326 audit(1588653806.025:19568): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50090}]}) 04:43:26 executing program 4: r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f00000000c0)={0x92, 0xa, 0x4, 0xc4070040, 0x4, {0x77359400}, {0x4, 0x2, 0x1, 0x1, 0x0, 0x0, "2e5810fc"}, 0x80000001, 0x1, @userptr=0x7, 0x10000, 0x0, r2}) ioctl$sock_TIOCOUTQ(r7, 0x5411, &(0x7f0000000140)) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000080)) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:43:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x87, 0x0, 0x0, 0x50000}]}) 04:43:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000480)={0x0, 0x5, 0xed1b, 0x157}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000500)={r2, 0xa0, "1b1f49ef9f72edacab829961706cb148d1bbbb7139d3dc1a1d43520fc2fbed044bdd0342528d6320f73c6d6a5526ac3c6c989fe49322c9ea947ac2aab5208690d33821fba55e09645e0c97417b60983c14be66fe5fe29cb352a80ec6afae28397cdf96b74a0c17f5afa263deeb261ed5eb3d40196bb7979205dcb56f592a89bae678ad3d9a7dcafedf49ee4c5d787ce03588fed5b1a43cae1fd14c327cdd3d8f"}, &(0x7f00000005c0)=0xa8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r10 = dup(r9) setsockopt$bt_rfcomm_RFCOMM_LM(r10, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f00000003c0)) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000380)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x3}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)="3a93e3c558d39a4eaea58ff4da4878ac7edff5706fd2b4b9ccbfed79b94d21701ca2f4c0defb94868a7503972d1812d2bd1a144657d5588ad89fa249eb846918423b107c0f6a3487fded511bde48b645a35379827bb2452e1eaf249826301a44bebd1c45b81babd94cb777e32357284c8c7f1bd76737e6012c4a836be30108da51eef16028d85b0a89d16f71156fe222002f31e51ed3f4b569", 0x99}, {&(0x7f0000000140)="47c03ab61de02ccb8c1d283e0bc4d7db7909ab33798511512422db28dc318c53215c2c155c0ff42b70163e4574138cc67c16eaad982f11da5861e911f274752717dfb3d17630afd174b2ab367fc12dc02fb109d5e08d41ff14b2ebd3fd1db8d699ac81b43008c8e2cc71595c0fa0b9355d52100b8faa8c6aefbccc70fbe8311c47d88c478c1f00654bd33b439bd9652ceb3325a363db3a34d1d8bd9c3aec5bfce505eb5af47b767f3de7b5695fec9c58a64e6451af51ecc04d82c5d03a4040717cb063edc4a1908efcfc2ee5510bb3f544c8a821ef9a8e26d70f7c19b9146edeebdb17044d01de799847d53bcb311bf487ab11278350", 0xf6}], 0x2, &(0x7f00000002c0)="eef94c5ccfa1f4e36e0144ed9edeb4a08963aa95d7d3a633fd27433a26fa9e3fda2665e9b6360fe22e67ee890cae20077ae9e39b5ea9eb950377b3026d2086af5b4da5992535a315a97709d22766071f13f9236a57ada22bc828cbd8656e9a3c3a9beb6196b5e2a259c1c64d27dd98e4d27c5c2694dc2b088fa7ab7cf0c643fbb2bf93fbc4a8bad68aef7e3c56", 0x8d, 0x1}, 0x20000000) 04:43:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x94, 0x0, 0x0, 0x50000}]}) 04:43:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2089.074328][ T7841] Dev loop4: unable to read RDB block 4 [ 2089.081588][ T7841] loop4: unable to read partition table [ 2089.098532][ T7841] loop4: partition table beyond EOD, truncated [ 2089.129417][ T7841] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc), 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x9c, 0x0, 0x0, 0x50000}]}) [ 2089.305293][ T7855] Dev loop4: unable to read RDB block 4 [ 2089.314898][ T7855] loop4: unable to read partition table [ 2089.331387][ T7855] loop4: partition table beyond EOD, truncated [ 2089.354338][ T7855] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2089.453545][ T27] audit: type=1326 audit(1588653806.825:19569): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xa}, {0x6}]}) 04:43:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc), 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0xa4, 0x0, 0x0, 0x50000}]}) [ 2089.611763][ T27] audit: type=1326 audit(1588653806.985:19570): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7875 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x500b0}]}) 04:43:27 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000002400)={{0x0, 0x0, 0x80}}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) getsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc), 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:27 executing program 0: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x3c}, {0x6, 0x0, 0x0, 0x4ffff}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x3f9, 0x300, 0x70bd27, 0x25dfdbfb, {0x1, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x440c0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x2, 0x420202) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f00000000c0)={0x9, 0x1ff, 0x400, 0x4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 04:43:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0xac, 0x0, 0x0, 0x50000}]}) 04:43:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0xb1, 0x0, 0x0, 0x50000}]}) 04:43:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x5, 0x81}, {0x9, 0x5, 0x1, 0x7fff}, {0xb9d, 0x81, 0x0, 0x8}]}) [ 2090.173773][ T7889] Dev loop4: unable to read RDB block 4 [ 2090.179919][ T7889] loop4: unable to read partition table [ 2090.193847][ T7889] loop4: partition table beyond EOD, truncated [ 2090.239787][ T7889] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x7, 0x6, 0x4, 0x70000, 0x0, {}, {0x5, 0x1, 0x1, 0x8, 0x0, 0x40, "13278563"}, 0x0, 0x1, @userptr=0x5, 0x20, 0x0, r0}) fadvise64(r1, 0x5, 0x2, 0x4) [ 2090.388429][ T27] audit: type=1326 audit(1588653807.765:19571): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7875 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xb}, {0x6}]}) 04:43:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)=0x9) [ 2090.549793][ T27] audit: type=1326 audit(1588653807.925:19572): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x500fc}]}) 04:43:28 executing program 4: getpid() socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r1, 0x806c4120, &(0x7f0000000140)) ptrace$setopts(0x4200, r2, 0xfffffffffffffff9, 0x100028) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x0, @local, 0xfff80000}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={r4}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000027c0)={r4}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x8, 0x8001, 0x9, 0x22, r4}, 0x10) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000080)) 04:43:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) accept$unix(r1, &(0x7f0000000080), &(0x7f0000000000)=0x6e) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) sendto$l2tp(r3, &(0x7f0000000100)="94d877b4f4747c73f3d798d31f9a1d919857c87796", 0x15, 0x800, &(0x7f0000000140)={0x2, 0x0, @loopback, 0x2}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff0000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000004}, 0x4080) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000000c0)={0x0, 0x5, 0xacd5}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x7a, &(0x7f0000000080)={r6}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000027c0)={r6}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={r6, 0x1}, &(0x7f0000000080)=0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2091.345035][ T27] audit: type=1326 audit(1588653808.726:19573): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xc}, {0x6}]}) 04:43:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x2, 0x0, 0x50000}]}) 04:43:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2091.458877][ T27] audit: type=1326 audit(1588653808.826:19574): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x501a2}]}) [ 2092.247382][ T27] audit: type=1326 audit(1588653809.626:19575): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:31 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) socket$isdn(0x22, 0x3, 0x24) 04:43:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x4, 0x0, 0x50000}]}) 04:43:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000000)=0x54) 04:43:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xd}, {0x6}]}) 04:43:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x502f2}]}) [ 2094.042635][ T27] audit: type=1326 audit(1588653811.416:19576): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7973 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2094.093876][ T7979] Dev loop4: unable to read RDB block 4 [ 2094.100004][ T7979] loop4: unable to read partition table [ 2094.111353][ T7979] loop4: partition table beyond EOD, truncated [ 2094.121310][ T7979] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2094.270185][ T7991] Dev loop4: unable to read RDB block 4 [ 2094.276937][ T7991] loop4: unable to read partition table [ 2094.301273][ T7991] loop4: partition table beyond EOD, truncated 04:43:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2094.357829][ T7991] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0xff, 0x50000}]}) 04:43:31 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="205011a8f21bea7adf6e9a81aa509905271d4ba38eec2048140e8581d715d56e361133d92281c2792d2c543b7d4d6a65bbfae6800a1cb863843e0ac6938c27449da62a8fb042b09b66ed2259c11f8f5f1217a633a49af20a1fe54b2c91d48d3990cfe48f873a6692ccd3d6ec3e947026bb47bbe0b03281b56f7abaf5133a04b044eaa212185a557bed7095ca0f86f88569342473d8c59d87bcf143cb20c293b34e522d70746a43f52247c1", 0xab, 0x4}], 0x2000800, &(0x7f00000001c0)={[{@noflush_merge='noflush_merge'}, {@alloc_mode_def='alloc_mode=default'}], [{@fsname={'fsname', 0x3d, 'selinuxselfvboxnet1em1eth1wlan1('}}]}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x400}, {&(0x7f0000001340)="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", 0x1d6, 0x5}]) socket(0x10, 0x2, 0x0) 04:43:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x6, 0x0, 0x50000}]}) 04:43:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) [ 2094.621235][ T8005] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2094.694335][ T8005] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 04:43:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x9, 0x0, 0x50000}]}) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2094.748417][ T8005] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2094.789789][ T8005] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 2094.848061][ T27] audit: type=1326 audit(1588653812.226:19577): auid=0 uid=0 gid=0 ses=4 subj=_ pid=7973 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xe}, {0x6}]}) 04:43:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x503fa}]}) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2095.016843][ T27] audit: type=1326 audit(1588653812.396:19578): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8027 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:32 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setresgid(r2, r4, r6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_read_part_table(0x8, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x2}]) 04:43:32 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6611, 0x0) r4 = perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x1, 0x8, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r3, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2000005}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x165e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001680)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001800)=':\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r5, r4, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r2, 0x0, 0x5, &(0x7f0000000000)='\xeeem0\x00', r6}, 0x30) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed3", 0x161, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x161, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x30, 0x0, 0x50000}]}) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x161, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2095.242497][ T8039] Dev loop4: unable to read RDB block 4 [ 2095.248108][ T8039] loop4: unable to read partition table [ 2095.280673][ T8039] loop4: partition table beyond EOD, truncated [ 2095.313044][ T8039] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x211, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:32 executing program 4: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x460, 0x3f3, 0x300, 0x70bd25, 0x25dfdbfd, {0x5, 0x0, 0x17, [0x1, 0x6, 0x6f6, 0x3, 0x9, 0xfffffff7, 0x1, 0x9, 0xffffffff, 0xffff, 0x0, 0x100, 0x20200, 0x7, 0x2, 0x6a, 0x1ff, 0x8, 0xd0, 0x3ba9, 0x40, 0x5, 0x3f, 0x4, 0xa0, 0x9, 0x755, 0x5, 0x8, 0x9, 0x7fffffff, 0x1000, 0xfffffff9, 0x6, 0x2, 0x7, 0x8, 0x5, 0x3, 0x2, 0x80, 0x8, 0x8000, 0x8, 0xfffffffd, 0x9, 0x0, 0x7f58f70e, 0x5cbd, 0xbcda, 0x4, 0x3ff, 0x1, 0x5, 0x7fffffff, 0x80000000, 0xfffffbff, 0x3, 0xffff, 0xcd, 0x7fffffff, 0x4, 0x20, 0x5e], [0x80, 0x3, 0x32f, 0x9fab, 0x73, 0x4, 0x40, 0x0, 0x80, 0x1f, 0x5, 0x5, 0x0, 0xfff, 0x2, 0x9, 0x5, 0x3f, 0x5, 0xffffffff, 0x3, 0x40000000, 0x1, 0x9, 0x7f, 0xffffffc0, 0x2, 0x4, 0x1, 0x8, 0x7b, 0x6, 0x5, 0x3, 0x6, 0x1, 0x4, 0x4, 0xadfb, 0x1ff, 0x80000000, 0x7f6, 0x8000, 0x8, 0x8, 0x8, 0x2, 0x4, 0x2, 0x7f, 0xd8e8, 0x471fa782, 0x9, 0x1ff, 0x400, 0x1, 0x3, 0x7, 0x8, 0x0, 0x8, 0x8, 0xa73a, 0x400], [0x100, 0xff, 0x81, 0xfffffffc, 0x0, 0x1, 0x81, 0xd8, 0x9, 0x6, 0x200, 0x0, 0x0, 0x7, 0x6, 0xffff59a3, 0x7fffffff, 0x0, 0x7, 0x6, 0x3, 0xffff, 0x10001, 0x7be7, 0x1, 0x6, 0x5, 0x136, 0x3f, 0xfffffc01, 0x5f57, 0x4, 0x6, 0x5, 0x20, 0x8, 0x8000, 0x1f, 0x9, 0xffffffff, 0x4, 0x9, 0x5, 0x7, 0x80000000, 0x200, 0x67, 0x2, 0x0, 0x200, 0x8, 0x0, 0x1f, 0x2, 0xffff, 0x7, 0x80000000, 0x80000000, 0x800000, 0x436, 0x3, 0x6, 0xffff8c82, 0x7], [0x6, 0x6, 0x5, 0x1, 0x9, 0x401, 0x10000, 0x7fffffff, 0x7, 0x7f, 0x7, 0x400, 0x0, 0x3, 0x8, 0x10000, 0x4, 0x9, 0xf3, 0x8, 0x8, 0xffffffff, 0x800, 0x3, 0x5, 0x800, 0xfffffbff, 0x9, 0xd22, 0x1, 0x2, 0x5, 0x2, 0x2, 0x1800000, 0x0, 0xd76, 0x4, 0x3, 0x6, 0x5, 0x1, 0x80000001, 0x9, 0xa479, 0x5, 0x49, 0x7, 0x7, 0xd7, 0x5, 0x1579, 0x4, 0x0, 0x2, 0x4, 0x7, 0x9c12, 0x3, 0x9, 0x1f, 0xaeb2, 0xfffffffb, 0x101], 0x3e, ['-eth0\x00', '!vboxnet1&vmnet1\x17&$\xaeproc+em1\x00', '\x00', 'vmnet1@\x12selinux{mime_type\x00']}, ["", "", ""]}, 0x460}, 0x1, 0x0, 0x0, 0x400c8d1}, 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x211, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2095.583460][ T8060] Dev loop4: unable to read RDB block 4 [ 2095.597324][ T8060] loop4: unable to read partition table [ 2095.609823][ T8060] loop4: partition table beyond EOD, truncated [ 2095.617735][ T8060] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2095.718962][ T8067] Dev loop4: unable to read RDB block 4 [ 2095.726097][ T8067] loop4: unable to read partition table [ 2095.742569][ T8067] loop4: partition table beyond EOD, truncated [ 2095.749111][ T8067] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x10}, {0x6}]}) [ 2095.808234][ T27] audit: type=1326 audit(1588653813.186:19579): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8027 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50600}]}) 04:43:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x211, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0xfc, 0x0, 0x50000}]}) [ 2095.931176][ T27] audit: type=1326 audit(1588653813.306:19580): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8075 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2096.719831][ T27] audit: type=1326 audit(1588653814.096:19581): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8075 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x80000000}, {0x6, 0x0, 0x0, 0x80000001}]}) 04:43:35 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000080)="58ba0f31f1cfa3eb68c251643916815b7d9209503cf0f1e7f49582c413d600855f6124b485c5fef6f1e36fa221209742e419fe5f082b6ecfa9da7257c1c2cb02a638697a8a9df0173bfbf3f126fc153de830c5d9c905eac46679577ca968eaee", &(0x7f0000000100)=""/66, 0x4}, 0x20) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x269, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x11}, {0x6}]}) 04:43:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50900}]}) 04:43:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x6, @ipv4={[], [], @loopback}, 0x19f4}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000080)="9f603f82ec3e222e221ec652e17e5467dc09069abc9810fba08f47c60e974b2a308e92ee61cf4cf5709913b5fa93aa09e608ff2ad9654c3494917cff1f5315993907b51da8299e4f3070b60a245ddf895e9114985a0976dfb7b7c60f522ad0bc9c2bda470f0e5798c042ea75689f4cf9046130fda4364db3f4d8f0d86cf87b9c113783639e81b240c8872e18b86955291e8aac00fd6c7c17ea4604206c4a9e4cec37446ae82dcc5079971c5f0ea95730e9e11ddb2ade337455d379d82b0a219e18615dd7d25364bd8810bcb18ab83fa731050c543dc48f5be0fee040fc2685f4f5a86121a1ea5dfd235888d1", 0xec}, {&(0x7f0000000180)="caec59153159aae721eb199b29377ad660e0677b4b46ceb080920f36d27cf63bd12c9a781b70f573efcd5bbaa0e692ba2471b361975f23764e12e1acd93437a5e42f37c0d5611d7e0b16da0b5d8155b7d2859e8a72c2", 0x56}, {&(0x7f00000002c0)="9d6ccaaa2cc1c9dd4140c9685ec6206c6e80775eee898b00e3dd716e21a6664c4e54d00c553c360fa851c364e31d162b42a10084c1d889b6ccb8a9a3cbbe74fe256cfddc9d3466caba267369fd7409451bdbe247c6d704cb851c717154bf59ce64c253df2ac8ac28dad694e78acc184e9742ebb884c243729f5a67c8abcb754c1bad48e4ff46702a9b9f68abe18791582457cdfaecbbc46fe4cb29e6e5d71525745ea8b8c6bf52d41b5d480ac257025d1ea4d991ff42b490e5265cdc45200a477555b1311ed291dc9a96039efdcfa030ce1d0df7454446fe06e0573fce8af86c651eb95bb911ff0ea85b0168d5d8fd48a1aa574ca0c846e5", 0xf8}, {&(0x7f0000000200)="164557e53d06d566c7eeba8b22ffd66af4f6f101bd7435a5257771ad693d80c2b6a781f4438b35d258dc43f06809e9782e0732a107dc961bde", 0x39}], 0x4, &(0x7f00000003c0)=[@dstopts={{0x38, 0x29, 0x37, {0x0, 0x3, [], [@ra={0x5, 0x2, 0x7}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3a}, @pad1, @enc_lim, @jumbo={0xc2, 0x4, 0x8}]}}}], 0x38}}, {{&(0x7f0000000400)={0xa, 0x4e24, 0x0, @mcast1, 0x4}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000440)="9f11852bd2a60afa854854b41ea4f5e265d89082b85457d0bb48d4cf580bfef87e6a240b85b4dd7be381621f03072d94c75adf526f866441e4e3fa90cc265361efff6c787e1402640b3e0c5fc830378fa77cf43a03e73a57729d72020186ba7995601aef2edd3b3f71a93df76ed5f1628d28408bce98af85ec7704133494035ee5d96b455eb5813f05f4b60a7ca25232d521a02a7bf056f793333ef87792c12d79d156a2ff9e41c41a6b897b21b1c2a67194cdab08221bb242da03b59c33ab1b70c29e45d5b9eb976761", 0xca}], 0x1}}, {{&(0x7f0000000580)={0xa, 0x101, 0x6, @private1={0xfc, 0x1, [], 0x1}, 0xfffffffa}, 0x1c, &(0x7f0000000840)=[{&(0x7f00000005c0)="1090755a4c99def8900fe09bd8a2e1b30731b92d2fd48f30a54340ce08d672e217ee65553827e3410a2d9a181801c10c0ea77a91067a2ce18787007d7323c973f6a4d721e723e943469da7d588007b36d9e235c199355d680d69ff6b0220e6ac2f54c1c058a9ddaf8de515a04653fd50de3fbfe0f388aa7ec912f8d9cbac5130c5b00e63d42d24ac6a0c49a6a34f5d83bab17f0e85bb5374f4d0432dfa196c18845a3713fe2474d4132052fe153ff95590f4c57abb7b320a8879599ad5bdb3cb75ef26", 0xc3}, {&(0x7f00000006c0)="71d2a0b4028d191f8162d740b1dba24d6762b049ba5bf46bbda387d5e0", 0x1d}, {&(0x7f0000000700)="cbeaa610bc1cd356b04ec6215e3fd410185d2f69ddd77556f928f041fec798a293dbf13f3e793d34968c8184c51b7fc40a8c62cd90a2527f24d6f692668c860c177f98af2db8fc100813e9f3848034dcc94ba8a868da3d4d31d492d3fed18b1ee70f514652e3007c3bbc7d8746433e17d6b6e3180cebf11a9c3e6f8fb41ac73edbbeca6a03b4377dea85beb57f9366", 0x8f}, {&(0x7f00000007c0)="f7e19934453c3562296ec277344b5965c79de150e4caa5d09ae9bc9417b1a8072dcc2b4cadd1e425dd9a03ef94e9fc3858ef610f534d7b5b17f0d3b528018980131f7f1a2f4ccea1d1842fc961f6d2a5a8fa7c5b219036492c8fdf54e50f5de27cde", 0x62}], 0x4, &(0x7f0000000880)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x2b, 0x4, 0x1, 0x3, 0x0, [@dev={0xfe, 0x80, [], 0x42}, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}], 0x50}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000900)="6a368473fa46e3fd66d967ae477aba602bffdb08204e2fcd3e9b764d6665832cd6fd9a949895d83c4671a47fe1b31aaf904e8e88c8d17cf4d04a264fe246077a7c80006cfdf2a4b1aadced2677609090898c3f4b4c", 0x55}], 0x1, &(0x7f00000009c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @dstopts_2292={{0x88, 0x29, 0x4, {0x3c, 0xd, [], [@generic={0xaf}, @pad1, @ra={0x5, 0x2, 0x80}, @ra={0x5, 0x2, 0xfc00}, @calipso={0x7, 0x38, {0x2, 0xc, 0x4, 0x3, [0xc3a0, 0x6, 0x1, 0x79, 0x5, 0x5]}}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x2d, 0x5, "b0166528c0"}, @hao={0xc9, 0x10, @remote}]}}}], 0xa0}}], 0x4, 0x8000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2098.197455][ T27] audit: type=1326 audit(1588653815.576:19582): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8096 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x269, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2098.238011][ T8097] Dev loop4: unable to read RDB block 4 [ 2098.244955][ T8097] loop4: unable to read partition table [ 2098.265839][ T8097] loop4: partition table beyond EOD, truncated 04:43:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x269, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2098.295518][ T8097] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x295, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:35 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) tkill(r2, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2098.437840][ T8113] Dev loop4: unable to read RDB block 4 [ 2098.447279][ T8113] loop4: unable to read partition table [ 2098.461709][ T8113] loop4: partition table beyond EOD, truncated [ 2098.470441][ T8113] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:35 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x295, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x2, 0x50000}]}) 04:43:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd124", 0x295, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x20, 0x5, 0x6}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) close(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000000)=0x2) [ 2098.989921][ T27] audit: type=1326 audit(1588653816.366:19583): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8096 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x12}, {0x6}]}) 04:43:36 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000000)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2ab, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x4, 0x50000}]}) 04:43:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x52000}]}) 04:43:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d5442", 0x2ab, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2099.124954][ T27] audit: type=1326 audit(1588653816.506:19584): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8145 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2099.922793][ T27] audit: type=1326 audit(1588653817.306:19585): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8145 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2ab, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000040)}) 04:43:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x6, 0x50000}]}) 04:43:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x25}, {0x6}]}) 04:43:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x53000}]}) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2b6, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:39 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2101.572955][ T27] audit: type=1326 audit(1588653818.957:19586): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8164 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2101.672330][ T8172] Dev loop4: unable to read RDB block 4 [ 2101.679437][ T8172] loop4: unable to read partition table [ 2101.693347][ T8172] loop4: partition table beyond EOD, truncated [ 2101.709150][ T8172] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:39 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xb536, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x9, 0x50000}]}) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2b6, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/syslog\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000), 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000180)=0x7fff, &(0x7f00000001c0)=0x2) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x15) ptrace$setregs(0xd, r5, 0xfffffffffffffffe, &(0x7f00000002c0)="dc0e41fadc15f8a54d61e9111a991d777bcd33ace4e8774e59e2f8cf13d3609e6e44118cfe365cc4a42696009e1bdd49e6f9d95458afb4e88858c2d266a48030ca196f804fb95539fab367e8f4db9982067ee39b522ce00eb2479b0a30a937964670c8a590e7ad5bb19a117532fd04000000ea00d879b1eb8e0f4075186cf33f") ptrace$cont(0x7, r5, 0x0, 0x0) sched_setaffinity(r5, 0x8, &(0x7f0000000200)=0x20000002) ioctl$TCFLSH(r1, 0x540b, 0x1) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2b6, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:39 executing program 4: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r2, 0x4112, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) getsockname$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef", 0x2bc, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2102.142058][ T8203] Dev loop4: unable to read RDB block 4 [ 2102.154585][ T8203] loop4: unable to read partition table [ 2102.168335][ T8203] loop4: partition table beyond EOD, truncated [ 2102.181524][ T8203] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2bc, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2102.373401][ T27] audit: type=1326 audit(1588653819.757:19587): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8164 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x2f}, {0x6}]}) 04:43:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x53f00}]}) 04:43:39 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f00000000c0)={0x60, 0xf, 0x2, 0x546, 0xf2, 0x7fffffff, &(0x7f00000001c0)="afb5ce0d93ba315ad89e64a5cb8b6fb63d05e2e71c3f893066ea2b95b6317458e3154b92d22aa3e256b36bbbca86e7e913582a5236d6a52aabc25e2903fb1511603a467e578d33dd9823ec5db2c3acd6f363039e6d04fba5a1f2298a7e73f9b56822c1eaadf2e3a774df9c9554c27ce2bd966f3dfd05f98a5d68be3d1c046ea9859c8ed185ac19983876012842dfc54e6a24bda888fe88f070eeda53b7ce8b96e9009eb8a30ffce5053cbd55c396151fa692b790b2b37c394b0086b381f53c2a9c6644edcff298c71e6124ec54e9ec56d42dd442d1c2d8c079f947fb9cb890cc899f56eb8bfbc722322b6b1e52c034e8bc05"}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000027c0)={r7}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000000)={r7, 0xffff, 0x1}, 0x8) 04:43:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2bc, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x30, 0x50000}]}) [ 2102.487385][ T27] audit: type=1326 audit(1588653819.867:19588): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8222 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2bf, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2102.618525][ T8230] Dev loop4: unable to read RDB block 4 [ 2102.624436][ T8230] loop4: unable to read partition table [ 2102.640176][ T8230] loop4: partition table beyond EOD, truncated 04:43:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2bf, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2102.680290][ T8230] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2102.802792][ T8244] Dev loop4: unable to read RDB block 4 [ 2102.808629][ T8244] loop4: unable to read partition table [ 2102.817668][ T8244] loop4: partition table beyond EOD, truncated [ 2102.824224][ T8244] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2103.292982][ T27] audit: type=1326 audit(1588653820.677:19589): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8222 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2bf, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0xfc, 0x50000}]}) 04:43:42 executing program 4: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r4) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) r5 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000000)={0x9b32, 0x1}) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x15) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x48}, {0x6}]}) 04:43:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x54000}]}) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) [ 2105.054003][ T27] audit: type=1326 audit(1588653822.437:19590): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8257 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50002}]}) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c0, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, 0x0, 0x0) 04:43:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="e695d7fd4428d67b8690c2809788d0d23de6ca8507f6dbda1a026d4cf74251dd5957592035f1d9310d12561f8368b816326835c4f4fc291e27a69cf4118ff3fdcc8d00d402c20870dec639ef07b451581c84f08d35ac0bcd7b6e851c68b0be42e8035c03309c445bb36d15d5a9f1162356c290e5633de0516003163aa2ab2c8106218b30d5a82afc81a83162a2356102205743ccdaee72e43c723f4aa07f66e45b4e834eb97fd8bcdb10edaa2dbb4e51f6b5ce32f8f1ef51476ffddc43b26cb723f9c62c45fea8e99b554a7c97edeedf1a0ef50079d6e6f18536931b9182b0b6248bc24b2491701015e71ec414e2ddc0bc226344e06cc0d386e9706661fc22574b4f295f07337bd2af8df4450c7325298de6bbbb660f6847d12a4070a5fc472a499bf82da42302bfcbc37ad4be47d21e1bd0ee7758f0cb859ba3c16c138fbe3d978bcc253ec3a0e14d45378c12d260cfdb955d6d7122ec4b03ea53c9bd5aed7ed32cbcea8063706aa391daf5e7a5a1e095309b9e65c8418f4ebfbda48d137baf185c75579457ca2bec93725813c88135d9d35708ed4aeea4d563fd2eb910b2b35a91182ff9a807a83642471822593e14eb1b36b1b3402d3d7f94749270155431e9fe7481aea2013b6816ae1ad4b95c7a7eea6e57c68d9ca3e83c5c5f1e8e2f79135f1c61479cefb3b9687ee3ed58a8e3dfecc29a977b152139aeb2804486f6c6273e467e7b824bfac50fc38025ce36713821f9231963ee5ffcf077b8dbe200cfc3bf9c23a4cdb51644f315c1be4f961ccff54e9bfc7804fee9c6cc042380bfd4959394cc1cce0590705c23d9e40fa1b3c7d67672a852da203174d965da5a7fda8407a4fff9d14be977607e6cf5f854f19923e70df4f6bfe8768028f0cbb6e333ff17d173a7bfc91bbf2715b199feb0bc92c4ccd12496ee1ef066ded3dbf5f3ffb968ace935b4ea363d544210c286a776a7c4aa5d1fb410435ddac4ef28ff86ebfe", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, 0x0, 0x0) [ 2105.850772][ T27] audit: type=1326 audit(1588653823.227:19591): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8257 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:45 executing program 4: getpid() r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) setsockopt(r1, 0x1ff, 0x81, &(0x7f00000000c0)="b4b3717c8a399343dc08a15f6d309ee290458c963244063a985c78b685f6845ae1226acaee51a7566a970c7c527bef4ed1eadab1356adec8a2c015321a85d4d38308607cd0ad36f02b9edf33c53cfd996080abbf4edd42691dfe95117d28824e6f1b4ee9b7fbdb345d20f4c15450c860ec8ddfdfd75e492ef10d31454cbdc8e89f0facfaf01fb4b995e2d3eab25e980bdaa3ec04e5e3f92131d47ba4fb13f04d952836a3323f8821cb902a15c7d7eb37c960d4a72fcbf07559a81d7e2a911daba4cd", 0xc2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) bind$ax25(r3, &(0x7f00000001c0)={{0x3, @null, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:43:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50004}]}) 04:43:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, 0x0, 0x0) 04:43:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x4c}, {0x6}]}) 04:43:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x55000}]}) 04:43:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@void, @val={0x11, 0x0, 0x0, 0x0, 0x60}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @remote}, @source_quench={0x8, 0x4, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}}, 0xfdef) [ 2108.189830][ T27] audit: type=1326 audit(1588653825.567:19592): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8297 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2108.215592][ T8298] Dev loop4: unable to read RDB block 4 [ 2108.223637][ T8298] loop4: unable to read partition table [ 2108.230545][ T8298] loop4: partition table beyond EOD, truncated [ 2108.240363][ T8298] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:45 executing program 4: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x4, 0x1}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2108.591981][ T8317] Dev loop4: unable to read RDB block 4 [ 2108.610030][ T8317] loop4: unable to read partition table [ 2108.632389][ T8317] loop4: partition table beyond EOD, truncated [ 2108.667986][ T8317] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2108.935983][ T8317] Dev loop4: unable to read RDB block 4 [ 2108.941977][ T8317] loop4: unable to read partition table [ 2108.964306][ T8317] loop4: partition table beyond EOD, truncated 04:43:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x68}, {0x6}]}) [ 2108.989894][ T27] audit: type=1326 audit(1588653826.368:19593): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8297 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2109.048873][ T8317] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2109.105527][ T27] audit: type=1326 audit(1588653826.478:19594): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8330 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:46 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) setpriority(0x0, r2, 0xc0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = accept4$packet(r4, 0x0, &(0x7f0000000000), 0x800) write(r5, &(0x7f0000000080)="e40d0b509be0738a541efa002710a88642eee0732fed98648ad5b0eff94117f691bc6e7c6e5e1d4746faf7c616de282d9d2cbe1e1e11cc7bff758700675a9d4d316abac3b6cfdf82fb2a14d2499d01e9596ff568a2c495df9300d63afe4308f8202ef1f6ccced04ba5cf0116f20d64ee10600dcad1a55d6a414dc6758a759349f641796aca7df661c518d8eaaad80d85953ebf27f738a1d77c51e830b3c713b19a7f41268e84d0af887084169387702e0fbc71ecd066904dcb54c9f841e4486890427082e8f4ae9d3298ead7c60839cfdbab", 0xd2) 04:43:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x56000}]}) 04:43:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50006}]}) 04:43:47 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000180)={0x80000001, @multicast}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x8, 0x0, 0x20, 0x3ff}]}) r2 = dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x2, @pix_mp={0x9, 0x9, 0x42323151, 0x2, 0x2, [{0x1, 0x2}, {0xc, 0x8}, {0x9cec, 0x8001}, {0x4, 0xff}, {0x1f, 0x4000000}, {0x0, 0xd43}, {0x4, 0x3}, {0x2, 0x2}], 0x80, 0x7f, 0x1, 0x1, 0x3}}) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r4, 0x40086414, &(0x7f0000000080)={0x2, 0x5}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x400, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000300)={0x3, 'geneve1\x00', {0x20}, 0xfffd}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x200, 0x20, 0x6, 0x5, 0x7, "d1c2cc9fcc9b5498"}) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x880) 04:43:47 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x21, &(0x7f0000000000)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x2000)=nil], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000180), 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 04:43:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x1f}, {0x8006, 0x4, 0x0, 0x50000}]}) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x10b9c0, 0x0) 04:43:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x1, 0x8002) r1 = open(&(0x7f0000000100)='./bus\x00', 0x1141042, 0x0) lstat(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x79}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socket$inet(0x2, 0xa, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0xb8}], 0x1, 0x50) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/46, 0x2e, 0x6) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 2109.908009][ T27] audit: type=1326 audit(1588653827.288:19595): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8330 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x6c}, {0x6}]}) 04:43:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2110.057219][ T27] audit: type=1326 audit(1588653827.438:19596): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8358 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0xfd, 0x4, 0x50000}]}) 04:43:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x57000}]}) [ 2110.159384][ T27] audit: type=1800 audit(1588653827.538:19597): pid=8360 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16330 res=0 04:43:47 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0x8002) r1 = open(&(0x7f0000000100)='./bus\x00', 0x1141042, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x79}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socket$inet(0x2, 0xa, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10800, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x50) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 2110.851822][ T27] audit: type=1326 audit(1588653828.238:19598): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8358 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:49 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50009}]}) 04:43:49 executing program 1: 04:43:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x74}, {0x6}]}) 04:43:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x59000}]}) 04:43:49 executing program 0: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000013c0)='net/vlan/vlan0\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x8000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x100, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1a83a9f25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r5, @ANYBLOB="02002bbd7002ffdbdf250200000c080002312836c0b42097931c21fdab5a1eb3e475f2"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x4004804}, 0x20044000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="50010000", @ANYRES16=r5, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x2004000}, 0x4) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="60010000", @ANYRES16=r5, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x24000090}, 0x4000817) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800e3ff", @ANYRES16=r5, @ANYBLOB="100027bd7000fddbdf2501000000240004800500030000000000050003000000000005000300020000000500030000000000"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x40) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x48, r5, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x4}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000081}, 0x240088d0) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r5, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb8, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a1e902b}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x695a6a0}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cbf5c2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e908f7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa1a5066}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4d}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x291d9adc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12c633f0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7203bfd6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1b}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x94, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f1290}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64a6a862}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7623d6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x33}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x204ddd7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7439ff83}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49adb36b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa2}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x566241f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x40001) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x18c, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0xaeeb9eda9149195f}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x109be589}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b193b33}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x3f, 0x5, 0x51094a91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52bf5fd5}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d17ebd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11a8c74a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x550fc2b5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52b868e5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27556f6b}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x6c, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9b9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf768}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1aed2c0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dea1a1f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e57}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x904}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1fae5253}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x807d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x45ae4b61}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x43f5da26}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe85b}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x80}, 0x48c00) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r5, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4085}, 0x4) [ 2112.309947][ T27] audit: type=1326 audit(1588653829.688:19599): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8390 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:49 executing program 1: [ 2112.381619][ T8395] Dev loop4: unable to read RDB block 4 [ 2112.388683][ T8395] loop4: unable to read partition table [ 2112.407071][ T8395] loop4: partition table beyond EOD, truncated [ 2112.420295][ T8395] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14}, 0x14) sendto$inet(r1, &(0x7f00000002c0)="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", 0x2c1, 0x0, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18}, 0xfdef) 04:43:49 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000080)={0x0, 0x240000, 0x8, 0x0, 0xe}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:50 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6}]) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) [ 2112.673280][ T8408] Dev loop4: unable to read RDB block 4 [ 2112.680291][ T8408] loop4: unable to read partition table [ 2112.719873][ T8408] loop4: partition table beyond EOD, truncated [ 2112.761153][ T8413] Dev loop1: unable to read RDB block 4 [ 2112.766963][ T8413] loop1: unable to read partition table [ 2112.775473][ T8408] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2112.803740][ T8413] loop1: partition table beyond EOD, truncated [ 2112.837192][ T8413] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:43:50 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa0, 0x0, 0x7, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xc0}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x800}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7fff}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1f}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xdf4b}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4040}, 0x10040) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f00000001c0)={0x33, 0x1, [], [@enc_lim={0x4, 0x1, 0xff}, @jumbo={0xc2, 0x4, 0x5}]}, 0x18) [ 2112.933919][ T8419] Dev loop4: unable to read RDB block 4 [ 2112.939529][ T8419] loop4: unable to read partition table [ 2112.950669][ T8419] loop4: partition table beyond EOD, truncated [ 2112.956896][ T8419] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:50 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6}]) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) [ 2113.119085][ T27] audit: type=1326 audit(1588653830.498:19600): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8390 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2113.147242][ T8429] Dev loop4: unable to read RDB block 4 [ 2113.152944][ T8429] loop4: unable to read partition table [ 2113.158635][ T8429] loop4: partition table beyond EOD, truncated 04:43:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x7a}, {0x6}]}) [ 2113.177291][ T8429] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50010}]}) 04:43:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x5a201}]}) [ 2113.278887][ T27] audit: type=1326 audit(1588653830.658:19601): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8442 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2113.282161][ T8433] Dev loop4: unable to read RDB block 4 [ 2113.340523][ T8433] loop4: unable to read partition table [ 2113.346260][ T8433] loop4: partition table beyond EOD, truncated [ 2113.352773][ T8438] Dev loop1: unable to read RDB block 4 [ 2113.358481][ T8438] loop1: unable to read partition table [ 2113.378057][ T8438] loop1: partition table beyond EOD, truncated [ 2113.381460][ T8433] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:50 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfffffffffffff4a4) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2113.419555][ T8438] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2113.600907][ T8456] Dev loop4: unable to read RDB block 4 [ 2113.610745][ T8456] loop4: unable to read partition table 04:43:51 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6}]) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) [ 2113.659051][ T8456] loop4: partition table beyond EOD, truncated [ 2113.694299][ T8456] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2113.831168][ T8462] Dev loop1: unable to read RDB block 4 [ 2113.837785][ T8462] loop1: unable to read partition table [ 2113.893264][ T8462] loop1: partition table beyond EOD, truncated [ 2113.924053][ T8462] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2113.941161][ T8468] Dev loop4: unable to read RDB block 4 [ 2113.947065][ T8468] loop4: unable to read partition table [ 2113.987604][ T8468] loop4: partition table beyond EOD, truncated 04:43:51 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6}]) 04:43:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0xfc}, {0x6}]}) [ 2114.061345][ T27] audit: type=1326 audit(1588653831.448:19602): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8442 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2114.063184][ T8468] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:51 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0xf, 0x10, 0x28, &(0x7f0000000080)="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"}) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2114.203641][ T27] audit: type=1326 audit(1588653831.588:19603): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8478 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2114.280819][ T8477] Dev loop1: unable to read RDB block 4 [ 2114.286500][ T8477] loop1: unable to read partition table 04:43:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x5b000}]}) [ 2114.327802][ T8477] loop1: partition table beyond EOD, truncated [ 2114.369136][ T8477] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:43:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50030}]}) [ 2114.461156][ T8487] Dev loop4: unable to read RDB block 4 [ 2114.481068][ T8487] loop4: unable to read partition table 04:43:51 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 2114.566153][ T8487] loop4: partition table beyond EOD, truncated 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) [ 2114.610524][ T8487] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) r3 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r2, r3, &(0x7f0000000280)=0x1, 0x101) [ 2114.731200][ T8501] Dev loop4: unable to read RDB block 4 [ 2114.737135][ T8501] loop4: unable to read partition table [ 2114.770875][ T8501] loop4: partition table beyond EOD, truncated [ 2114.824838][ T8501] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) [ 2114.998275][ T27] audit: type=1326 audit(1588653832.378:19604): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8478 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:52 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000000)) 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) 04:43:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) [ 2115.157721][ T27] audit: type=1326 audit(1588653832.538:19605): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8517 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) 04:43:52 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r2, r3, &(0x7f0000000280)=0x1, 0x101) 04:43:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x5f202}]}) 04:43:52 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x82000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0xd, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0xa, 0x1, 0x0, r1}, @exit, @call={0x85, 0x0, 0x0, 0x4e}, @ldst={0x2, 0x1, 0x3, 0x4, 0x6, 0x1, 0x8}, @alu={0x4, 0x0, 0xb, 0x9, 0xb, 0xffffffffffffffff, 0x10}, @generic={0x1, 0x6, 0x0, 0x5, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8001}, @alu={0x4, 0x1, 0xc, 0x1, 0x8, 0x8, 0x10}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7fd, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0x1, r1, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xe, 0x5, 0x1f}, 0x10, 0xffffffffffffffff, r3}, 0x78) r4 = dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) r7 = add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r7) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) dup(r6) ioctl$KDGKBMODE(r4, 0x4b44, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="61472a951267f79e9930a9ce602a77eb0ae53bd4c27c3f25a758aaeab6106e3a38b21818a202b0de107ce033c9871ae4b3e0211e97832cc7e906d68b5cead76ef7fd83a60b05d49ef227a75d254533b8f38094567560d55e6140289092b8418f0210567dd7d5d2ca60fcbca6c3fea7c824f37919ba89dbab2738996599f1c69f99f7a6f0d3ac0ac2d4369710", 0x8c, 0xfffffffffffffff9}]) 04:43:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50050}]}) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000280)=0x1, 0x101) 04:43:53 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000000)={0x4, 0xa, 0x2, "41475de42ac87170422d95ac7d8145641607bb5d9c4829ab83ca58a7f33e7953", 0x31364d59}) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000280)=0x1, 0x101) [ 2115.931932][ T8543] Dev loop4: unable to read RDB block 4 [ 2115.944926][ T8543] loop4: unable to read partition table 04:43:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x2}, {0x6}]}) [ 2115.981421][ T27] audit: type=1326 audit(1588653833.368:19606): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8517 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2116.014141][ T8543] loop4: partition table beyond EOD, truncated [ 2116.053963][ T27] audit: type=1326 audit(1588653833.438:19607): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8554 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2116.091047][ T8543] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) dup(r1) r2 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000280)=0x1, 0x101) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r2, r3, &(0x7f0000000280)=0x1, 0x101) [ 2116.280728][ T8547] Dev loop4: unable to read RDB block 4 [ 2116.286332][ T8547] loop4: unable to read partition table [ 2116.299477][ T8547] loop4: partition table beyond EOD, truncated [ 2116.309998][ T8547] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x5fa03}]}) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r1, r2, &(0x7f0000000280)=0x1, 0x101) 04:43:53 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) 04:43:54 executing program 1: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) 04:43:54 executing program 1: getpid() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2116.864642][ T27] audit: type=1326 audit(1588653834.238:19608): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8554 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50060}]}) 04:43:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x3}, {0x6}]}) 04:43:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) 04:43:54 executing program 4: r0 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/40) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) [ 2117.156495][ T27] audit: type=1326 audit(1588653834.538:19609): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8588 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2117.211172][ T8592] Dev loop4: unable to read RDB block 4 [ 2117.217034][ T8592] loop4: unable to read partition table [ 2117.229123][ T8592] loop4: partition table beyond EOD, truncated [ 2117.239769][ T8592] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000013c0)='net/vlan/vlan0\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x8000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x100, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1a83a9f25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r5, @ANYBLOB="02002bbd7002ffdbdf250200000c080002312836c0b42097931c21fdab5a1eb3e475f2"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000010", @ANYRES16=r5, @ANYBLOB="00032cbd7000fbdbdf2502000000080001000300000008000200060000001c0108801c00078008000600f900000054000780080005009ce7951908000500856f8165080006005b00000008000600a0000000080005003f6c6852080005001ed4602e08000500a5124e2208000600e000000008000500af11974808000600cb000000340007801c0007800800050057a4520d080006007f0000000800050073fa0f77040007802400078008000600dc0000000800060040000000080005009c9a9172080005001a46ee622c000780080005003e58a23b08000500f42337300800060052000000080006004a000000080005008411514c1400078008000500a863b06008004b0000000000"], 0x140}, 0x1, 0x0, 0x0, 0x4004804}, 0x20044000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="50010000", @ANYRES16=r5, @ANYBLOB="200028bd7000fcdbdf250100000024010c8024000b8008000900f8a8560c08000a001976000008000a00ed780000080009001366db150c000b80080009009af17a3324000b8008000a004fe6000008000900e5d9c31808000900872b521508000a008aaf00000c000b8008000900c039b61d04000b800c000b8008000900e782840f1c000b8008000a009070000008000a004e6a000008000900cf8161491c000b800800090028915d2c08000900b1ba554a08000900ad0df56e4c000b800800090024de747a080009004180ab229feab01527cb48fb15ad6f4208000a004c03000008000900b797391208000900a1d1d9200800090070d498770800090062808a630800090063f0650008000a006fd600002c000b8008000a006ba80000080009001f68dd7108000a00125d000008000a001fa10000080009002b28770a08000100010000000800010066f2b482be78387c4b7a261045851b47e5a79c01659d5ae6d8ed13374f839b8d842b7fe5f677f16cdae8a0915fc7cc17c49d22b3d3c7b8d874cae9a283c68d3ae121eab9f018b671b6fd6942fe435b66c530bb6dd8d102"], 0x150}, 0x1, 0x0, 0x0, 0x2004000}, 0x4) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="60010000", @ANYRES16=r5, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x24000090}, 0x4000817) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800e3ff", @ANYRES16=r5, @ANYBLOB="100027bd7000fddbdf2501000000240004800500030000000000050003000000000005000300020000000500030000000000"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x40) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x48, r5, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x4}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000081}, 0x240088d0) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r5, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb8, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a1e902b}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x695a6a0}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cbf5c2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e908f7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa1a5066}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4d}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x291d9adc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12c633f0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7203bfd6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1b}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x94, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f1290}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64a6a85f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7623d6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x33}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x204ddd7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7439ff83}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49adb36b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa2}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x566241f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x40001) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x15c, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0xaeeb9eda9149195f}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x109be589}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b193b33}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x51094a91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52bf5fd5}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d17ebd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11a8c74a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x550fc2b5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52b868e5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc5c0}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3dba060}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x10}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x636e2342}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x80}, 0x48c00) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x11c, r5, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x108, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4eb01595}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x0, 0x5, 0x5a527360}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6bd896d6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLREM={0xfffffffffffffc66, 0x6, 0x6b}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x69dae7db}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x218f94d8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x96345d1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x392b3da3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3cb4324a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x148a15ef}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33688f85}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLREM={0x0, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6fea2587}, @NLBL_CIPSOV4_A_MLSLVLREM={0x0, 0x6, 0xfe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5c2a0e46}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5fb15358}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7724b641}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3dfced27}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f201ca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ad71a0c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x271ebbde}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c2bd76f}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20040014}, 0x4811) 04:43:54 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x1, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x3fe}, {&(0x7f0000001340)="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"/467, 0x1d3, 0x401}]) 04:43:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x5fc00}]}) 04:43:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2117.455568][ T8609] Dev loop4: unable to read RDB block 4 [ 2117.476420][ T8609] loop4: unable to read partition table [ 2117.510219][ T8609] loop4: partition table beyond EOD, truncated [ 2117.545924][ T8609] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:55 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2117.586521][ T4115] Dev loop4: unable to read RDB block 4 [ 2117.613066][ T4115] loop4: unable to read partition table 04:43:55 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2117.649709][ T4115] loop4: partition table beyond EOD, truncated 04:43:55 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) [ 2117.940553][ T8630] Dev loop4: unable to read RDB block 4 [ 2117.946270][ T8630] loop4: unable to read partition table [ 2117.954367][ T8630] loop4: partition table beyond EOD, truncated [ 2117.963171][ T8630] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2117.984119][ T27] audit: type=1326 audit(1588653835.369:19610): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8588 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2118.091116][ T8636] Dev loop4: unable to read RDB block 4 [ 2118.096722][ T8636] loop4: unable to read partition table [ 2118.109994][ T8636] loop4: partition table beyond EOD, truncated [ 2118.116171][ T8636] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50070}]}) 04:43:55 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) 04:43:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x4}, {0x6}]}) 04:43:55 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000340)={0x1, 0x5}, 0x8) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000300)) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x281}, "7f56b6bf95efcdb3", "805c1ed94cc37cb57aa4d05146bdb6bb7de7ad99f31b767ee45983f27b5594c9", "eccbfff5", "d26ca122ff6fbf78"}, 0x38) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x251, 0x1}]) 04:43:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x7, &(0x7f0000000040)=[{0x4009, 0xdf, 0x94, 0x7}, {0x5, 0xab, 0xe3, 0x2}, {0x4, 0x81, 0x7, 0x2}, {0x7ab3, 0x5, 0x7, 0x7ff}, {0x2008, 0x1, 0x2, 0x8}, {0x81, 0x8, 0x96, 0xfffffffd}, {0x2, 0x66, 0x6, 0x1}]}) 04:43:55 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000280)=0x1, 0x101) [ 2118.276629][ T27] audit: type=1326 audit(1588653835.659:19611): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8645 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)) [ 2118.363865][ T8651] Dev loop4: unable to read RDB block 4 [ 2118.374897][ T8651] loop4: unable to read partition table [ 2118.388645][ T8651] loop4: partition table beyond EOD, truncated 04:43:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x16, &(0x7f0000000080)=[{0x3, 0x7, 0xf8, 0x7}]}) r0 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000000)) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x3000)=nil) 04:43:55 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000280)=0x1, 0x101) [ 2118.420218][ T8651] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:43:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0xfd, 0x0, 0x50000}]}) 04:43:55 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000280)=0x1, 0x101) 04:43:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pivot_root(&(0x7f0000000080)='./file0/file0/file0/file0\x00', &(0x7f0000000300)='./file0/file0/file0/file0\x00') ioctl$KDGKBSENT(r0, 0x4b4a, &(0x7f00000000c0)={0x0, "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"}) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) faccessat(r2, &(0x7f0000000000)='./file0/file0/file0\x00', 0x45, 0x1100) [ 2119.062114][ T27] audit: type=1326 audit(1588653836.439:19612): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8645 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50090}]}) 04:43:56 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000280)=0x1, 0x101) 04:43:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) 04:43:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x8, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x4, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000002, 0x12, r2, 0x0) r3 = gettid() r4 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) r6 = dup2(r5, r4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(r6, 0x80081270, &(0x7f0000000200)) timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x20, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) sendmsg$AUDIT_SET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x3e9, 0xb02, 0x70bd28, 0x25dfdbfe, {0x7b, 0x0, 0x2, r3, 0x98, 0x2, 0x1, 0x0, 0x2c2abe29}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000180)=0x22, 0x4) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000100)={0x1, 0x5, 0x4, 0xe000, 0x3, {0x77359400}, {0x3, 0xa, 0x0, 0x0, 0x6, 0x28, "5804eb93"}, 0x0, 0x4, @userptr=0x8, 0x7}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="44000000be76cf790154d3a07c81d152322434352530e63159fa8db1496e6ea95d596a4943dd53a90673908f66347a8293fc1e2f1a5f2b64c9a0c723efcdfcb5ee4b733a394cd79e9644d2849493e715d7f59103e6c6db1c47cabcdccb0a6771328c1a3fad1f3fb3258a394fe50bfafc50c973dab576", @ANYRES16=r8, @ANYBLOB="f086ef5a09fbf2230000fb0000080009000008000a000040000008001800ac1414bb0800190000322e1023f1f747cb000000000000002f4752c3dea372537a4d6d6330ebb0a077b7569138f3d1470f4bfe0b14efebcc0e5e070c3a4d580cf3c471d5b15955fed7294fe72b433423561afeaa4bf5b31fc602503f055f1f94dda213bee970e8e20f62a7776c2560cb332498ed790152775371347c89e228fbc26b1f15b24e45b88ec8986e855cd91923e5170c56292e47a0a19f56a0b2e691bb7da9975923804d0b0a95baa1b02515f6ff98909ecb7cf41f32672790cad8ed"], 0x44}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 04:43:56 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xffffffffffffffff, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0xfffffffffffffffc}]) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000027c0)={r7}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r7, 0xffffffff}, 0x8) sendmsg$key(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x2, 0x4a, 0x2, 0x21, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_lifetime={0x4, 0x4, 0x200, 0x1, 0x1fffffffe0000, 0x58c}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d3}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e23, 0x377, @empty, 0xffff}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2f}}}, @sadb_x_sec_ctx={0x12, 0x18, 0x7f, 0x8, 0x83, "5d140c6167d050d293e75ba7aab020fad3c36b89cf9bdf3ac6091df22305980b7004b7163400b824f21f2ff76c1b337cd9475e9e1bb058e9d48f922a49ea38b4c3eaffd5e6e7acf029337749f3fc6bdd29992336b24b47f9a4b099b2d1034b0f9e44501a584aa86c7f6cb6c771d0eff692cfa6e745e6c3400eaa9942d5945c8a497724"}]}, 0x108}}, 0x0) 04:43:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x5}, {0x6}]}) 04:43:56 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) [ 2119.359220][ T27] audit: type=1326 audit(1588653836.739:19613): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8696 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2119.362213][ T8704] binder: 8694:8704 ioctl 80081270 20000200 returned -22 04:43:56 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@caif=@dgm, &(0x7f0000000000)=0x80) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$isdn(0x22, 0x3, 0x20) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$RTC_IRQP_READ(r6, 0x8008700b, &(0x7f00000004c0)) pwritev(r5, &(0x7f0000000440)=[{&(0x7f00000001c0)="f6069b4a5605f85b72d6a9b68b4620865141587a056e978066c6ead92b5c135a418f30c340ee2f2bb5bba7ea76a47b1efa41fd8e122d192d3596f1742e96f1a7c8016cbf2d310c000c3bd2bfb3c3be0936eed1b5923ee0fbc2edf94fa18c473c35e49fb7210f1ebc8239e13ccd1f791b8b06e221524ecba21e3e2a82a9658f1e6e40f0d709c38e54eb8ae24ee86e9a5a7b67db6826f244ad", 0x98}, {&(0x7f0000000280)="ab611fafa71bd6107b0e74f498af7aa5ba7fd40e32f9144e194e1b6b14a7fbe40b41a6115d2530360ab51034d306b3e832802c45de278f2f891317202a238c082c4260a77ea2ba1e5449cc36f7a4667f2b3a7d97a13899fc6d5dfe69b7c43ae013f665b1d97f0aa48318135e3f7a", 0x6e}, {&(0x7f0000000300)="76c4353ba6f51407a38dd2c41e8757922df760c455061a916faebd0c8b7fce8661ade9fdc74e61bb5a49793eb635376d89b9a784239905ec278f0eabfd4ccaee05547d68f36989a220f64956c09c6a802b53505878936f81ed4a57f25e59f90d19872ad24cde77a4a7f23b3ad3b998aaf2a71fb487bfd169fa1cb5cdbd48dd74264c49df533a9c11264783bdb954d9de0384517c67909033b8f61561", 0x9c}, {&(0x7f00000003c0)="35b7d538ea5f4541ef666dc65fa7e7c106d2db745204c260924acade16f44e3124c234cb78e30cb89ae1a0cabfc2b0f8a8ec3343da6f402809fae356ab28455182df4a961d0827f7bf6844ddb2d49a56fb6389274a4a1d6f46b867a640d02c628d07b81b4477cee584106d0e20731e07aa5caffc54", 0x75}], 0x4, 0x8) r7 = socket$inet(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x7a, &(0x7f0000000080)={r8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000027c0)={r8}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r8, @in6={{0xa, 0x4e24, 0x0, @local, 0x800}}, 0x7, 0x81, 0x6, 0x2, 0x10, 0xf23b, 0x20}, 0x9c) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) [ 2119.509114][ T8707] binder: 8694:8707 ioctl 80081270 20000200 returned -22 04:43:56 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) 04:43:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:57 executing program 4: getpid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioprio_get$pid(0x3, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:43:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000280)=0x1, 0x101) [ 2120.159559][ T27] audit: type=1326 audit(1588653837.539:19614): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8696 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x500a0}]}) 04:43:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x8}, {0x5, 0x0, 0x40, 0x8}]}) 04:43:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:43:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0xdc}]}) 04:43:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x6}, {0x6}]}) 04:43:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 2120.411385][ T27] audit: type=1326 audit(1588653837.799:19615): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8739 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:43:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:43:57 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000000)={0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f0000000100)={0xa20000, 0x2, 0x4, r8, 0x0, &(0x7f00000000c0)={0x990a5e, 0x700, [], @p_u8=&(0x7f0000000080)=0x40}}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={r4, 0x80000, r9}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r11 = dup(r10) setsockopt$bt_rfcomm_RFCOMM_LM(r11, 0x12, 0x3, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r11, 0x894c, &(0x7f0000000180)=0x1000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:43:58 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:43:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x80}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2121.214576][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 2121.214584][ T27] audit: type=1326 audit(1588653838.599:19617): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8739 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2121.251129][ T27] audit: type=1326 audit(1588653838.639:19618): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8740 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r3}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x9, 0x3, 0xe}, {0x8}}}]}}]}, 0x58}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8010) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00ff0f000000000008000400", @ANYRES32=r7, @ANYBLOB="140000000000000000"], 0x3c}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@private, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010000108000000000000000000000000d399237550aed7711dc2d488e58c7e61c6a67229acda90fd4ffabe91b954a9caaa2b1a7928a562721a037742b35ba95b35ef4e37f23987d5cbdaf8bd34abcc03384e50271f60d3d20743c357d29a1af0756ea0011525e5f6b0299654d5288a26d9b89d122a83c45eee4c83609eebc2e84e35182dabb35c7954", @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r11, @ANYBLOB="140003007465616d3000"/20], 0x3c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r4, @ANYBLOB="000127bd7000fcdbdf250100000008000100", @ANYRES32=r7, @ANYBLOB="80000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000400000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="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"], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x8040) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x7}, {0x6}]}) 04:44:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xfffe, 0x0, 0x5}, {0x6, 0x0, 0x3, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r2, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private1}]}, 0x28}, 0x1, 0x0, 0x0, 0x50}, 0x40800) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x1) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000080)={0xffff, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x1, 0x2, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e24, @private=0xa010101}}]}, 0x190) socket$vsock_stream(0x28, 0x1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) 04:44:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x500b0}]}) [ 2122.700762][ T27] audit: type=1326 audit(1588653840.069:19619): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8776 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:00 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/148) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x15) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x1f, 0x1, 0x20, 0xfd, 0x0, 0x80000000, 0x201, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x4d4c, 0x6}, 0x840, 0x5, 0x0, 0x8, 0x1f, 0x2, 0x3}, r5, 0xb, r4, 0x2) 04:44:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000140)) r1 = dup(r0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) accept$ax25(r1, &(0x7f0000000080)={{0x3, @bcast}, [@bcast, @bcast, @bcast, @remote, @null, @default, @default, @null]}, &(0x7f0000000000)=0x48) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)) [ 2122.859751][ T8787] Dev loop4: unable to read RDB block 4 [ 2122.868944][ T8787] loop4: unable to read partition table [ 2122.891651][ T8787] loop4: partition table beyond EOD, truncated [ 2122.931552][ T8787] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 2123.492851][ T27] audit: type=1326 audit(1588653840.869:19620): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8776 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2123.534332][ T8812] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 04:44:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000080)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x1}, 0x16, 0x1) r7 = dup(r4) ioctl$NBD_DO_IT(r7, 0xab03) 04:44:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 04:44:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000000c0)) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/adsp1\x00', 0x400000, 0x0) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) 04:44:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x8}, {0x6}]}) [ 2123.650773][ T27] audit: type=1326 audit(1588653841.029:19621): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8815 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x500fc}]}) 04:44:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 2124.448143][ T27] audit: type=1326 audit(1588653841.819:19622): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8815 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:03 executing program 4: rt_sigpending(&(0x7f0000001300), 0x8) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001900)={0x53, 0xfffffffffffffffc, 0x51, 0x3, @scatter={0x8, 0x0, &(0x7f0000001780)=[{&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/172, 0xac}, {&(0x7f00000011c0)=""/119, 0x77}, {&(0x7f0000001240)=""/162, 0xa2}, {&(0x7f0000001540)=""/225, 0xe1}, {&(0x7f0000001640)=""/106, 0x6a}, {&(0x7f00000016c0)=""/185, 0xb9}]}, &(0x7f0000001800)="d6f1d4d9bceb6d0f17d43facfceac693b876688d9f22dcba4890c2b2313ed00ea39d12b9c50c6f5ceb462598d272adb80686cad148650b110d0fc3643ad2bbf654728d82bbdb09d20357a9815b24e0086e", &(0x7f0000001880)=""/100, 0x39}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) 04:44:03 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@remote, @mcast2, @remote, 0x401, 0xfff, 0x6, 0x500, 0x4, 0x80, r4}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 04:44:03 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x90800, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x9, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x9, 0x1ff, 0x1000}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x800}}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{}, {0x6, 0x0, 0x3, 0x50000}]}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000020801010000000000000000030000090900010073797a31000000000900010073797a30000000000900010073797a310000000022f16bb80b5d9b4f3ad2b2513cbe1155a7c3e84f69ba5a714a47cd96882a615cbcdca9ac19b0a1a30dea203e95f04ed2088d2c6ddc72a40b19e40acc09c4f6cd0f36f7091c4f7aba8b2af8dd"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x40008084) 04:44:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x9}, {0x6}]}) 04:44:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x501a2}]}) [ 2125.870624][ T4115] Dev loop4: unable to read RDB block 4 [ 2125.876275][ T4115] loop4: unable to read partition table [ 2125.896835][ T4115] loop4: partition table beyond EOD, truncated 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 2125.918429][ T27] audit: type=1326 audit(1588653843.289:19623): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8846 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x1, 0x4, 0x20}]}) 04:44:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6, 0x0, 0x3, 0x50000}]}) r0 = socket(0xa, 0x4, 0x80000001) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0xff}, @sack_perm, @mss={0x2, 0x8}, @sack_perm, @window={0x3, 0x6, 0x3ff}, @timestamp, @mss={0x2, 0x2}], 0x7) [ 2126.139268][ T8862] Dev loop4: unable to read RDB block 4 [ 2126.145018][ T8862] loop4: unable to read partition table [ 2126.157933][ T8862] loop4: partition table beyond EOD, truncated [ 2126.172205][ T8862] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x1, 0x4, 0x20}]}) 04:44:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = pidfd_getfd(r1, r0, 0x0) bind$packet(r2, &(0x7f0000000000)={0x11, 0x1c, 0x0, 0x1, 0x4, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x88c2, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f00000000c0)={0x20, 0x1, 0x28, 0x800, 0x6}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f00000023c0)) 04:44:03 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/141, 0x8d, 0x20) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@private1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private0}}, &(0x7f0000000440)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={r4, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote}, 0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x1, 0x4, 0x20}]}) 04:44:03 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x410380, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) write$P9_RWSTAT(r4, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r6}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000027c0)={r6}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r6, @ANYBLOB="00c00500e8881e4f79b39c796d2407ef71da50e8529e16ab800501000900e073afb58a096bb9dfc0fe9ff0146162755e540704fd78bd9dcc46b1d45dec"], 0x12) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) ioctl$USBDEVFS_RESET(r8, 0x5514) 04:44:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x0, 0x0, 0x0, 0x50000}]}) 04:44:04 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000000)={@any, 0x2e1}) sendto(r0, &(0x7f0000000080)="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", 0xfe, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) [ 2126.718359][ T27] audit: type=1326 audit(1588653844.090:19624): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8846 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xa}, {0x6}]}) 04:44:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x502f2}]}) 04:44:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x0, 0x0, 0x0, 0x50000}]}) 04:44:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x0, 0x10001}, {0x6, 0x0, 0x0, 0x7}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) 04:44:04 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="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", 0x1d6, 0x1}]) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0x100, 0x2) setxattr$smack_xattr_label(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)={'],'}, 0x3, 0x4) 04:44:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x1, 0x3000) msgsnd(r0, &(0x7f0000000200)={0x1}, 0x8, 0x0) msgsnd(r0, &(0x7f0000000080)={0x2, "4dd0bb2c3702a2d645e1ec968875ebd640d2350c5c7b58f38da5de44cf95c143d565a0fb45cf70c54b8c1d612ecd630c2b0243c4acdb2ff0bfc14c0985a651f661e2bf0e2fa586adf919f39f41519cf5e5a1597fa201136cc16642032c2093a2ab499f5c60087a6d057c0d83b67ce4504847cc842c614bdcf4b6fa2b4619b55ebc77bb299318827e7484d307f347176160ed1004916f310eca066d6110d99ade28d11ed7b2c64b3e92ceef3b41dc61a2040231ff4f76dcee636aa323ec722979928411c7eac6a776dce19bd9e4e6fc41de5aef54b5459833d2f561b9baf2681ff2604c303b9edd4014ba50c01b7420965c760849fbc2d6cf3fdc2bbe99bc"}, 0x106, 0x800) [ 2126.807598][ T27] audit: type=1326 audit(1588653844.180:19625): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x0, 0x0, 0x0, 0x50000}]}) [ 2126.914953][ T27] audit: type=1326 audit(1588653844.290:19626): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8917 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2126.995112][ T8921] Dev loop4: unable to read RDB block 4 [ 2127.001402][ T8921] loop4: unable to read partition table [ 2127.026707][ T8921] loop4: partition table beyond EOD, truncated [ 2127.056644][ T8921] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:44:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6}]}) 04:44:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) dup(r3) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000100)) setsockopt$PNPIPE_INITSTATE(r2, 0x113, 0x4, &(0x7f0000000000)=0x9, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100, 0x0) epoll_create(0x0) [ 2127.170858][ T8930] Dev loop4: unable to read RDB block 4 [ 2127.178260][ T8930] loop4: unable to read partition table [ 2127.214986][ T8930] loop4: partition table beyond EOD, truncated [ 2127.223574][ T27] audit: type=1326 audit(1588653844.600:19627): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2127.266176][ T8930] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:44:04 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x1, 0x101) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000000080)="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", 0x1d6}]) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) [ 2127.520565][ T8949] Dev loop4: unable to read RDB block 4 [ 2127.538421][ T8949] loop4: unable to read partition table [ 2127.564105][ T8949] loop4: partition table beyond EOD, truncated [ 2127.592556][ T8949] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:44:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x4, 0x4}, {0xa, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x4) [ 2127.614569][ T27] audit: type=1326 audit(1588653844.990:19628): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:05 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x8001, 0xffc1, 0x9, 0x800, 0xf, "68be36882e78e7c2"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0xffff08e3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xb}, {0x6}]}) [ 2127.710972][ T27] audit: type=1326 audit(1588653845.090:19629): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8917 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2127.782998][ T27] audit: type=1326 audit(1588653845.150:19630): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8960 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x503fa}]}) 04:44:05 executing program 4: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="1c0000002f00092fd22780258c6394fb012448b6ed960b5005000200", 0x1c}], 0x1}, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000023c0)=[{0x0, 0x0, 0x401}, {&(0x7f0000001340)="0c84e8542017e7313e8c561d94e3c8f28aa286e72a65bdcb3dd863ab9dcda325c73bf6137fad7fa65c8a6b75c09a905898ab4cd3a9e981c86f57b4cb21d83a36ca35314f14586aa2705a046632f13d96c29e2e8452dfdbaa716f064bcce0e71040bad56d4de0f6c7c964651ceb48188b4e9961a9babc0ba9ee2e31d567e35bbb3b0e3132cdc72c7ba30965dcbd2ec81db1960795ec0cd7a9d4661c54b31ae8383b775b70c37d208002e827e98c7d6bb7e4ec0cc641a2ca25f2c615ce2bc0c1751a3a458e0ebd414675c5d3d22b1f7fa0e7d290c18bfa126ddf8bb1947a4e577f227e82d8a4515d27a081603523160cc360e049188b14b95d455b717ab8cd5b539e77c9421c60fa177d1a13dd7baaec603aa1e6cc25efb1b51c4b309984bfdd7c8a1855920509599f58ea0a0ba8a6a841b9b33ea46debd7ccb20f86543d30786923307e5ed4acdba3e2f51f7ebb89f2b0d076a61f4d9d2b93d458c7332a1bb2469bb22d03ce442fd3ec894debc318df50ce8729d85e4e5b197e923f8bb760a331a6eae724e10bafdfc34ccfd623a225880746851b724348efa5f16c8d84f141b4d6cfa44c95e1ab0f0116c889bc2403cc54940bf09c58fa16f5a86d781fd82e5f75c8ab299a1235234e466ad18187a7fb28bfe9cd7a13", 0x1d6, 0x1}]) 04:44:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x1, 0x4, 0x4, 0x100, 0x6, {0x77359400}, {0x3, 0x0, 0x1c, 0x3f, 0x0, 0x81, "25fe42f8"}, 0x400, 0x2, @userptr, 0x9b, 0x0, r2}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r5, 0x7ff, 0x4e97, r7}) 04:44:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000080)={0x0, 0x80000000}) 04:44:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6}]}) [ 2127.990507][ T8974] Dev loop4: unable to read RDB block 4 [ 2127.996464][ T8974] loop4: unable to read partition table [ 2128.007826][ T8974] loop4: partition table beyond EOD, truncated [ 2128.024643][ T8974] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2128.100351][ T27] audit: type=1326 audit(1588653845.480:19631): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8980 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0x800, 0x70bd26, 0x25dfdbff, {0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x48800}, 0x801) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x14, 0x4}, {0x6, 0x0, 0x0, 0x80000003}, {0x3, 0x3, 0x8, 0x81}, {0x5, 0x9, 0x4, 0xe53}, {0x7fff, 0x1, 0x7a, 0xfffff131}]}) 04:44:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x30}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:05 executing program 5: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x15}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffdffa5f00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2128.572239][ T27] audit: type=1326 audit(1588653845.950:19632): auid=0 uid=0 gid=0 ses=4 subj=_ pid=8960 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xc}, {0x6}]}) 04:44:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x70000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2128.689318][ T27] audit: type=1326 audit(1588653846.060:19633): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9007 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50600}]}) 04:44:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="7df7000000000000000010"], 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2d4, r3, 0x5b090d07e7503471, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x697}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffff00}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5de}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xe4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4d3}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6fa}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x240000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_SOCK={0xb0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xe4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x81}]}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x41000}, 0xc001) 04:44:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) 04:44:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x4, 0x20}, {0x6}]}) 04:44:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x41}, 0x48010) 04:44:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:06 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2129.179778][ T9035] FAULT_INJECTION: forcing a failure. [ 2129.179778][ T9035] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.223171][ T9035] CPU: 0 PID: 9035 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2129.231785][ T9035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.241847][ T9035] Call Trace: [ 2129.245140][ T9035] dump_stack+0x1e9/0x30e [ 2129.249470][ T9035] should_fail+0x433/0x5b0 [ 2129.253888][ T9035] ? alloc_pipe_info+0xe4/0x470 [ 2129.258742][ T9035] should_failslab+0x5/0x20 [ 2129.263238][ T9035] kmem_cache_alloc_trace+0x57/0x300 [ 2129.268528][ T9035] alloc_pipe_info+0xe4/0x470 [ 2129.273280][ T9035] splice_direct_to_actor+0x95b/0xb40 [ 2129.278651][ T9035] ? rcu_lock_release+0x9/0x20 [ 2129.283398][ T9035] ? do_splice_direct+0x340/0x340 [ 2129.288416][ T9035] ? fsnotify_perm+0x64/0x390 [ 2129.293095][ T9035] do_splice_direct+0x201/0x340 [ 2129.297961][ T9035] ? security_file_permission+0x30/0xc0 [ 2129.303513][ T9035] do_sendfile+0x809/0xfe0 [ 2129.307954][ T9035] __x64_sys_sendfile64+0x164/0x1a0 [ 2129.313157][ T9035] ? do_syscall_64+0x19/0x1b0 [ 2129.317838][ T9035] do_syscall_64+0xf3/0x1b0 [ 2129.322354][ T9035] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2129.328241][ T9035] RIP: 0033:0x45c829 [ 2129.332133][ T9035] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2129.351827][ T9035] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2129.360336][ T9035] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 04:44:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0xffff, 0x0, 0x0, 0x50000}]}) [ 2129.368309][ T9035] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2129.376284][ T9035] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2129.384259][ T9035] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2129.392230][ T9035] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xd}, {0x6}]}) 04:44:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x5, &(0x7f0000000080)=[{0x9, 0x7, 0x0, 0xb5}, {0x1, 0xfe, 0x9, 0x3ff}, {0x5, 0x4, 0x81, 0x3}, {0x7, 0x20, 0x4, 0x9}, {0x8, 0x6, 0x7, 0x10000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) 04:44:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50900}]}) 04:44:07 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2341400, &(0x7f0000000100)={'trans=xen,', {[{@cache_none='cache=none'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@dfltgid={'dfltgid', 0x3d, r1}}], [{@obj_role={'obj_role', 0x3d, ':&%vboxnet1(em0'}}, {@pcr={'pcr', 0x3d, 0x27}}, {@subj_user={'subj_user', 0x3d, 'eth0wlan0#security#cpuset'}}, {@obj_type={'obj_type'}}]}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:07 executing program 4 (fault-call:2 fault-nth:1): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 2130.345241][ T9070] FAULT_INJECTION: forcing a failure. [ 2130.345241][ T9070] name failslab, interval 1, probability 0, space 0, times 0 04:44:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 2130.386097][ T9070] CPU: 1 PID: 9070 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2130.394737][ T9070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2130.404813][ T9070] Call Trace: [ 2130.408109][ T9070] dump_stack+0x1e9/0x30e [ 2130.412445][ T9070] should_fail+0x433/0x5b0 [ 2130.416864][ T9070] ? kcalloc+0x32/0x60 [ 2130.420931][ T9070] should_failslab+0x5/0x20 [ 2130.425428][ T9070] __kmalloc+0x74/0x330 [ 2130.429573][ T9070] ? kmem_cache_alloc_trace+0x24c/0x300 [ 2130.435098][ T9070] kcalloc+0x32/0x60 [ 2130.438968][ T9070] alloc_pipe_info+0x1fc/0x470 [ 2130.443715][ T9070] splice_direct_to_actor+0x95b/0xb40 [ 2130.449068][ T9070] ? rcu_lock_release+0x9/0x20 [ 2130.453823][ T9070] ? do_splice_direct+0x340/0x340 [ 2130.458822][ T9070] ? fsnotify_perm+0x64/0x390 [ 2130.463474][ T9070] do_splice_direct+0x201/0x340 [ 2130.468301][ T9070] ? security_file_permission+0x30/0xc0 [ 2130.473819][ T9070] do_sendfile+0x809/0xfe0 [ 2130.478221][ T9070] __x64_sys_sendfile64+0x164/0x1a0 [ 2130.483392][ T9070] ? do_syscall_64+0x19/0x1b0 [ 2130.488043][ T9070] do_syscall_64+0xf3/0x1b0 [ 2130.492519][ T9070] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2130.498383][ T9070] RIP: 0033:0x45c829 [ 2130.502253][ T9070] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2130.522010][ T9070] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2130.530390][ T9070] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2130.538332][ T9070] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2130.546300][ T9070] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2130.554259][ T9070] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2130.562212][ T9070] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4}, {0x53, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200, 0x1}, 0x80) 04:44:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xe}, {0x6}]}) 04:44:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) 04:44:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x0, 0xff}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x1000, 0x0, 0x0, 0x400}, {0x6, 0x0, 0x0, 0x50003}]}) 04:44:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x0, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:08 executing program 4 (fault-call:2 fault-nth:2): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2131.176040][ T9101] FAULT_INJECTION: forcing a failure. [ 2131.176040][ T9101] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.207562][ T9101] CPU: 0 PID: 9101 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2131.216175][ T9101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.226243][ T9101] Call Trace: [ 2131.229540][ T9101] dump_stack+0x1e9/0x30e [ 2131.233878][ T9101] should_fail+0x433/0x5b0 [ 2131.238305][ T9101] should_failslab+0x5/0x20 [ 2131.242810][ T9101] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 2131.248527][ T9101] ? __kasan_kmalloc+0x12c/0x160 [ 2131.253460][ T9101] ? __kmalloc_node+0x37/0x60 [ 2131.258130][ T9101] __kmalloc_node+0x37/0x60 [ 2131.262625][ T9101] kvmalloc_node+0x81/0x100 [ 2131.267189][ T9101] iov_iter_get_pages_alloc+0xbda/0x1170 [ 2131.272824][ T9101] default_file_splice_read+0x125/0xa40 [ 2131.278376][ T9101] ? memset+0x1f/0x40 [ 2131.282349][ T9101] ? fsnotify+0x12c3/0x1370 [ 2131.286869][ T9101] ? __ia32_sys_tee+0xa0/0xa0 [ 2131.291538][ T9101] splice_direct_to_actor+0x3c1/0xb40 [ 2131.296905][ T9101] ? do_splice_direct+0x340/0x340 [ 2131.301927][ T9101] do_splice_direct+0x201/0x340 [ 2131.306774][ T9101] ? security_file_permission+0x30/0xc0 [ 2131.312313][ T9101] do_sendfile+0x809/0xfe0 [ 2131.316743][ T9101] __x64_sys_sendfile64+0x164/0x1a0 [ 2131.321927][ T9101] ? do_syscall_64+0x19/0x1b0 [ 2131.326596][ T9101] do_syscall_64+0xf3/0x1b0 [ 2131.331094][ T9101] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2131.336977][ T9101] RIP: 0033:0x45c829 [ 2131.340866][ T9101] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2131.360488][ T9101] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2131.368893][ T9101] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2131.376867][ T9101] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2131.384835][ T9101] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2131.392804][ T9101] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2131.400776][ T9101] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x52000}]}) 04:44:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r2, &(0x7f0000000000)) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080), 0x4) 04:44:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x0, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:08 executing program 4 (fault-call:2 fault-nth:3): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x7a, &(0x7f0000000080)={r3}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000027c0)={r3}, &(0x7f0000002800)=0x8) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000027c0)={r7}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={r3, 0x10, 0x3f, 0x3477, 0x70, 0xfff9, 0xc238, 0x7f, {r7, @in6={{0xa, 0x4e24, 0xfffffffd, @private1, 0x6}}, 0x3, 0xfffffff7, 0x764c6280, 0x7}}, &(0x7f0000000000)=0xb0) [ 2131.558607][ T9111] FAULT_INJECTION: forcing a failure. [ 2131.558607][ T9111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2131.574790][ T9111] CPU: 1 PID: 9111 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2131.583392][ T9111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.593470][ T9111] Call Trace: [ 2131.596755][ T9111] dump_stack+0x1e9/0x30e [ 2131.601070][ T9111] should_fail+0x433/0x5b0 [ 2131.605469][ T9111] prepare_alloc_pages+0x28c/0x4a0 [ 2131.610568][ T9111] __alloc_pages_nodemask+0xbc/0x5e0 [ 2131.615829][ T9111] ? trace_kmalloc_node+0xd7/0x130 [ 2131.620919][ T9111] push_pipe+0x37a/0x630 [ 2131.625138][ T9111] iov_iter_get_pages_alloc+0xc70/0x1170 [ 2131.630750][ T9111] default_file_splice_read+0x125/0xa40 [ 2131.636278][ T9111] ? memset+0x1f/0x40 [ 2131.640234][ T9111] ? fsnotify+0x12c3/0x1370 [ 2131.644714][ T9111] ? __ia32_sys_tee+0xa0/0xa0 [ 2131.649368][ T9111] splice_direct_to_actor+0x3c1/0xb40 [ 2131.654716][ T9111] ? do_splice_direct+0x340/0x340 [ 2131.659718][ T9111] do_splice_direct+0x201/0x340 [ 2131.664561][ T9111] ? security_file_permission+0x30/0xc0 [ 2131.670083][ T9111] do_sendfile+0x809/0xfe0 [ 2131.674499][ T9111] __x64_sys_sendfile64+0x164/0x1a0 [ 2131.681664][ T9111] ? do_syscall_64+0x19/0x1b0 [ 2131.686313][ T9111] do_syscall_64+0xf3/0x1b0 [ 2131.690792][ T9111] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2131.696670][ T9111] RIP: 0033:0x45c829 [ 2131.700537][ T9111] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2131.721078][ T9111] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2131.729469][ T9111] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2131.737434][ T9111] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2131.745389][ T9111] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2131.753349][ T9111] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2131.761294][ T9111] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 [ 2131.789206][ T27] kauditd_printk_skb: 4 callbacks suppressed 04:44:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x10}, {0x6}]}) [ 2131.789214][ T27] audit: type=1326 audit(1588653849.160:19638): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9085 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:09 executing program 4 (fault-call:2 fault-nth:4): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2131.870381][ T27] audit: type=1326 audit(1588653849.250:19639): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9120 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2131.947731][ T9128] FAULT_INJECTION: forcing a failure. [ 2131.947731][ T9128] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.990822][ T9128] CPU: 1 PID: 9128 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2131.999466][ T9128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.009517][ T9128] Call Trace: [ 2132.012796][ T9128] dump_stack+0x1e9/0x30e [ 2132.017109][ T9128] should_fail+0x433/0x5b0 [ 2132.021532][ T9128] should_failslab+0x5/0x20 [ 2132.026010][ T9128] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 2132.031703][ T9128] ? __kmalloc_node+0x37/0x60 [ 2132.036389][ T9128] __kmalloc_node+0x37/0x60 [ 2132.040867][ T9128] kvmalloc_node+0x81/0x100 [ 2132.045358][ T9128] seq_read+0x19b/0xce0 [ 2132.049487][ T9128] ? fsnotify+0x12c3/0x1370 [ 2132.053967][ T9128] ? get_page_from_freelist+0x810/0xa80 [ 2132.059487][ T9128] ? __might_fault+0x92/0x150 [ 2132.064140][ T9128] do_iter_read+0x44b/0x550 [ 2132.068622][ T9128] vfs_readv+0xc2/0x120 [ 2132.072758][ T9128] ? iov_iter_get_pages_alloc+0xea4/0x1170 [ 2132.078556][ T9128] default_file_splice_read+0x579/0xa40 [ 2132.084086][ T9128] ? memset+0x1f/0x40 [ 2132.088042][ T9128] ? fsnotify+0x12c3/0x1370 [ 2132.092522][ T9128] ? __ia32_sys_tee+0xa0/0xa0 [ 2132.097330][ T9128] splice_direct_to_actor+0x3c1/0xb40 [ 2132.102681][ T9128] ? do_splice_direct+0x340/0x340 [ 2132.107696][ T9128] do_splice_direct+0x201/0x340 [ 2132.112523][ T9128] ? security_file_permission+0x30/0xc0 [ 2132.118042][ T9128] do_sendfile+0x809/0xfe0 [ 2132.122448][ T9128] __x64_sys_sendfile64+0x164/0x1a0 [ 2132.127620][ T9128] ? do_syscall_64+0x19/0x1b0 [ 2132.132446][ T9128] do_syscall_64+0xf3/0x1b0 [ 2132.136925][ T9128] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2132.142793][ T9128] RIP: 0033:0x45c829 [ 2132.146659][ T9128] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2132.166235][ T9128] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2132.174618][ T9128] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2132.182560][ T9128] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2132.190552][ T9128] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2132.198505][ T9128] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2132.206457][ T9128] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x0, 0x4, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:09 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x1ff, 0x1, 0xff, 0xffff}, {0x5, 0x9, 0x70, 0x1000}, {0x1f, 0x2, 0x8, 0x7fffffff}]}) 04:44:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1, 0x0, 0x20}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:09 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1510c1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2132.678881][ T27] audit: type=1326 audit(1588653850.060:19640): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9120 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x53000}]}) 04:44:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x14, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x6, 0x1, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000}, 0x4000010) 04:44:11 executing program 4 (fault-call:2 fault-nth:5): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3ff, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000002c0)=0x8, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001400)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x24}}, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x10040, 0x0) set_thread_area(&(0x7f00000000c0)={0x6, 0x100000, 0x400, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x80, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_BSSID={0xa, 0xf5, @dev={[], 0x3d}}, @NL80211_ATTR_SCAN_SSIDS={0x28, 0x2d, 0x0, 0x1, [{0x8, 0x0, [0x1f, 0xf, 0x7, 0xe]}, {0xa, 0x0, [0x17, 0x1a, 0x5, 0x10, 0x5, 0xc]}, {0x6, 0x0, [0xd, 0x7]}, {0x7, 0x0, [0x7, 0x1, 0x20]}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x1}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x20, 0x5}}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="53b64b79332b"}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_BSSID={0xa, 0xf5, @broadcast}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x8}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008004}, 0x40004) 04:44:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x11}, {0x6}]}) 04:44:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x53f00}]}) [ 2134.571991][ T27] audit: type=1326 audit(1588653851.950:19641): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9160 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2134.609530][ T9168] FAULT_INJECTION: forcing a failure. [ 2134.609530][ T9168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2134.622752][ T9168] CPU: 0 PID: 9168 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2134.631333][ T9168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.641389][ T9168] Call Trace: [ 2134.644799][ T9168] dump_stack+0x1e9/0x30e [ 2134.649146][ T9168] should_fail+0x433/0x5b0 [ 2134.653576][ T9168] prepare_alloc_pages+0x28c/0x4a0 [ 2134.658685][ T9168] __alloc_pages_nodemask+0xbc/0x5e0 [ 2134.663987][ T9168] kmem_getpages+0x49/0x900 [ 2134.668477][ T9168] cache_grow_begin+0x7b/0x2e0 [ 2134.673218][ T9168] cache_alloc_refill+0x359/0x3f0 [ 2134.678218][ T9168] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 2134.683911][ T9168] ? check_preemption_disabled+0xb0/0x240 [ 2134.689613][ T9168] ? debug_smp_processor_id+0x5/0x20 [ 2134.694881][ T9168] kmem_cache_alloc_node_trace+0x1bf/0x2b0 [ 2134.700660][ T9168] ? __kmalloc_node+0x37/0x60 [ 2134.705311][ T9168] __kmalloc_node+0x37/0x60 [ 2134.709788][ T9168] kvmalloc_node+0x81/0x100 [ 2134.714269][ T9168] seq_read+0x19b/0xce0 [ 2134.718411][ T9168] ? fsnotify+0x12c3/0x1370 [ 2134.722902][ T9168] ? get_page_from_freelist+0x810/0xa80 [ 2134.728428][ T9168] ? __might_fault+0x92/0x150 [ 2134.733100][ T9168] do_iter_read+0x44b/0x550 [ 2134.737599][ T9168] vfs_readv+0xc2/0x120 [ 2134.741743][ T9168] ? iov_iter_get_pages_alloc+0xea4/0x1170 [ 2134.747537][ T9168] default_file_splice_read+0x579/0xa40 [ 2134.753069][ T9168] ? memset+0x1f/0x40 [ 2134.757023][ T9168] ? fsnotify+0x12c3/0x1370 [ 2134.761513][ T9168] ? __ia32_sys_tee+0xa0/0xa0 [ 2134.766165][ T9168] splice_direct_to_actor+0x3c1/0xb40 [ 2134.771600][ T9168] ? do_splice_direct+0x340/0x340 [ 2134.776602][ T9168] do_splice_direct+0x201/0x340 [ 2134.781430][ T9168] ? security_file_permission+0x30/0xc0 [ 2134.786951][ T9168] do_sendfile+0x809/0xfe0 [ 2134.791353][ T9168] __x64_sys_sendfile64+0x164/0x1a0 [ 2134.796521][ T9168] ? do_syscall_64+0x19/0x1b0 [ 2134.801172][ T9168] do_syscall_64+0xf3/0x1b0 [ 2134.805648][ T9168] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2134.811510][ T9168] RIP: 0033:0x45c829 [ 2134.815392][ T9168] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2134.835959][ T9168] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2134.844360][ T9168] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2134.852309][ T9168] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2134.860254][ T9168] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 04:44:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x3, 0x1}, {0x106, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x1, 0x7f, 0x1, 0x0, 0x3, 0x10004, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x1}, 0x0, 0x40, 0x1ff, 0x6, 0x1, 0x100, 0x400}, r1, 0x5, r3, 0x2) [ 2134.868197][ T9168] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2134.876139][ T9168] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:12 executing program 4 (fault-call:2 fault-nth:6): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2135.019773][ T9183] FAULT_INJECTION: forcing a failure. [ 2135.019773][ T9183] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.050731][ T9183] CPU: 1 PID: 9183 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2135.059337][ T9183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2135.069391][ T9183] Call Trace: [ 2135.072683][ T9183] dump_stack+0x1e9/0x30e [ 2135.077019][ T9183] should_fail+0x433/0x5b0 [ 2135.081445][ T9183] should_failslab+0x5/0x20 [ 2135.085948][ T9183] kmem_cache_alloc_node+0x64/0x290 [ 2135.091143][ T9183] ? __alloc_skb+0x94/0x4f0 [ 2135.095645][ T9183] __alloc_skb+0x94/0x4f0 [ 2135.099971][ T9183] ? remove_wait_queue+0x23/0x120 [ 2135.104996][ T9183] alloc_skb_with_frags+0xb6/0x590 [ 2135.110107][ T9183] ? lockdep_hardirqs_on+0x4a4/0x8a0 [ 2135.115382][ T9183] sock_alloc_send_pskb+0x7a0/0x890 [ 2135.121254][ T9183] ? do_task_dead+0xb0/0xb0 [ 2135.125813][ T9183] rfcomm_sock_sendmsg+0x25c/0x6a0 [ 2135.130928][ T9183] ? rfcomm_sock_getsockopt+0x7e0/0x7e0 [ 2135.136465][ T9183] kernel_sendmsg+0xe2/0x120 [ 2135.141063][ T9183] sock_no_sendpage+0xe0/0x120 [ 2135.145834][ T9183] sock_sendpage+0xf0/0x120 [ 2135.150338][ T9183] pipe_to_sendpage+0x208/0x2d0 [ 2135.155180][ T9183] ? sock_fasync+0xf0/0xf0 [ 2135.159598][ T9183] __splice_from_pipe+0x329/0x870 [ 2135.164633][ T9183] ? generic_splice_sendpage+0x180/0x180 [ 2135.170266][ T9183] generic_splice_sendpage+0x112/0x180 [ 2135.175728][ T9183] splice_direct_to_actor+0x482/0xb40 [ 2135.181098][ T9183] ? do_splice_direct+0x340/0x340 [ 2135.186142][ T9183] do_splice_direct+0x201/0x340 [ 2135.190987][ T9183] ? security_file_permission+0x30/0xc0 [ 2135.196518][ T9183] do_sendfile+0x809/0xfe0 [ 2135.200941][ T9183] __x64_sys_sendfile64+0x164/0x1a0 [ 2135.206122][ T9183] ? do_syscall_64+0x19/0x1b0 [ 2135.210791][ T9183] do_syscall_64+0xf3/0x1b0 [ 2135.215284][ T9183] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2135.221159][ T9183] RIP: 0033:0x45c829 [ 2135.225070][ T9183] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2135.244658][ T9183] RSP: 002b:00007f5a9a053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2135.253052][ T9183] RAX: ffffffffffffffda RBX: 00000000004fc2c0 RCX: 000000000045c829 [ 2135.261010][ T9183] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 04:44:12 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x11, 0x0, 0x0, 0x2}, {0x6}]}) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f00000000c0)=""/208, 0xd0}, {&(0x7f00000001c0)=""/110, 0x6e}, {&(0x7f0000000240)=""/73, 0x49}], 0x4, 0x40) [ 2135.268968][ T9183] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2135.276924][ T9183] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000005 [ 2135.284880][ T9183] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f5a9a0546d4 04:44:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14, 0x40}, {0x6}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa00, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0x1, 0x100}) 04:44:12 executing program 0: r0 = semget$private(0x0, 0x3, 0x704) semop(r0, &(0x7f0000000000)=[{0x3, 0x7, 0x1000}, {0x1, 0x7f, 0x1000}, {0x0, 0x7, 0x2800}], 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {0x0, r5, r3}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r5}}, 0xc) [ 2135.375887][ T27] audit: type=1326 audit(1588653852.751:19642): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9160 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x12}, {0x6}]}) [ 2135.416257][ T27] audit: type=1326 audit(1588653852.781:19643): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9191 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2135.528865][ T27] audit: type=1326 audit(1588653852.911:19644): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9199 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x54000}]}) 04:44:13 executing program 4 (fault-call:2 fault-nth:7): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:13 executing program 1 (fault-call:0 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2136.068736][ T9215] FAULT_INJECTION: forcing a failure. [ 2136.068736][ T9215] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.103391][ T9215] CPU: 0 PID: 9215 Comm: syz-executor.1 Not tainted 5.7.0-rc4-syzkaller #0 [ 2136.111999][ T9215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.122055][ T9215] Call Trace: [ 2136.125339][ T9215] dump_stack+0x1e9/0x30e [ 2136.129660][ T9215] should_fail+0x433/0x5b0 [ 2136.134074][ T9215] ? do_seccomp+0x817/0x1ea0 [ 2136.138668][ T9215] should_failslab+0x5/0x20 [ 2136.143170][ T9215] kmem_cache_alloc_trace+0x57/0x300 [ 2136.148453][ T9215] ? security_capable+0xb1/0xd0 [ 2136.153301][ T9215] do_seccomp+0x817/0x1ea0 [ 2136.157720][ T9215] ? check_preemption_disabled+0xb0/0x240 [ 2136.163436][ T9215] ? debug_smp_processor_id+0x5/0x20 [ 2136.168740][ T9215] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 2136.174451][ T9215] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 2136.180510][ T9215] do_syscall_64+0xf3/0x1b0 [ 2136.184993][ T9215] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2136.190864][ T9215] RIP: 0033:0x45c829 [ 2136.194732][ T9215] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2136.214311][ T9215] RSP: 002b:00007fb807335c78 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2136.222695][ T9215] RAX: ffffffffffffffda RBX: 00000000004fbd80 RCX: 000000000045c829 [ 2136.230640][ T9215] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000001 [ 2136.238604][ T9215] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2136.246636][ T9215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2136.254580][ T9215] R13: 00000000000008c7 R14: 00000000004d55a0 R15: 00007fb8073366d4 04:44:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 04:44:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000040)=r5) sendfile(r0, r1, 0x0, 0x101) 04:44:13 executing program 1 (fault-call:0 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2136.616015][ T9235] FAULT_INJECTION: forcing a failure. [ 2136.616015][ T9235] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.634165][ T9235] CPU: 1 PID: 9235 Comm: syz-executor.1 Not tainted 5.7.0-rc4-syzkaller #0 [ 2136.642901][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.652957][ T9235] Call Trace: [ 2136.656255][ T9235] dump_stack+0x1e9/0x30e [ 2136.660610][ T9235] should_fail+0x433/0x5b0 [ 2136.665033][ T9235] should_failslab+0x5/0x20 [ 2136.669538][ T9235] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 2136.675253][ T9235] ? do_seccomp+0x817/0x1ea0 [ 2136.679838][ T9235] ? do_syscall_64+0xf3/0x1b0 [ 2136.684513][ T9235] ? __get_vm_area_node+0x1ac/0x380 [ 2136.689717][ T9235] __get_vm_area_node+0x1ac/0x380 [ 2136.694746][ T9235] __vmalloc_node_range+0xed/0x8b0 [ 2136.699869][ T9235] ? bpf_prog_alloc_no_stats+0x6b/0x250 [ 2136.705428][ T9235] __vmalloc+0x40/0x50 [ 2136.709500][ T9235] ? bpf_prog_alloc_no_stats+0x6b/0x250 [ 2136.715057][ T9235] bpf_prog_alloc_no_stats+0x6b/0x250 [ 2136.720428][ T9235] bpf_prog_alloc+0x1a/0x140 [ 2136.725027][ T9235] bpf_prog_create_from_user+0x9f/0x3e0 [ 2136.730570][ T9235] ? bpf_prog_run_pin_on_cpu+0x190/0x190 [ 2136.736199][ T9235] do_seccomp+0x85f/0x1ea0 [ 2136.740612][ T9235] ? check_preemption_disabled+0xb0/0x240 [ 2136.746322][ T9235] ? debug_smp_processor_id+0x5/0x20 [ 2136.751605][ T9235] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 2136.757323][ T9235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 2136.763392][ T9235] do_syscall_64+0xf3/0x1b0 [ 2136.767894][ T9235] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2136.773776][ T9235] RIP: 0033:0x45c829 [ 2136.777662][ T9235] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2136.797265][ T9235] RSP: 002b:00007fb807335c78 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2136.805676][ T9235] RAX: ffffffffffffffda RBX: 00000000004fbd80 RCX: 000000000045c829 [ 2136.813645][ T9235] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000001 [ 2136.821613][ T9235] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2136.829583][ T9235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2136.837547][ T9235] R13: 00000000000008c7 R14: 00000000004d55a0 R15: 00007fb8073366d4 [ 2136.856512][ T9235] warn_alloc: 6 callbacks suppressed [ 2136.856526][ T9235] syz-executor.1: vmalloc: allocation failure: 4096 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 2136.876864][ T9235] CPU: 1 PID: 9235 Comm: syz-executor.1 Not tainted 5.7.0-rc4-syzkaller #0 [ 2136.885450][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.895527][ T9235] Call Trace: [ 2136.898819][ T9235] dump_stack+0x1e9/0x30e [ 2136.903325][ T9235] warn_alloc+0x17d/0x2c0 [ 2136.907667][ T9235] ? __get_vm_area_node+0x1ac/0x380 [ 2136.912859][ T9235] ? __get_vm_area_node+0x1bf/0x380 [ 2136.918059][ T9235] __vmalloc_node_range+0x2ac/0x8b0 [ 2136.923260][ T9235] __vmalloc+0x40/0x50 [ 2136.927322][ T9235] ? bpf_prog_alloc_no_stats+0x6b/0x250 [ 2136.932862][ T9235] bpf_prog_alloc_no_stats+0x6b/0x250 [ 2136.938232][ T9235] bpf_prog_alloc+0x1a/0x140 [ 2136.942820][ T9235] bpf_prog_create_from_user+0x9f/0x3e0 [ 2136.948359][ T9235] ? bpf_prog_run_pin_on_cpu+0x190/0x190 [ 2136.954011][ T9235] do_seccomp+0x85f/0x1ea0 [ 2136.958430][ T9235] ? check_preemption_disabled+0xb0/0x240 [ 2136.964143][ T9235] ? debug_smp_processor_id+0x5/0x20 [ 2136.969422][ T9235] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 2136.975127][ T9235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 2136.981188][ T9235] do_syscall_64+0xf3/0x1b0 [ 2136.985683][ T9235] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2136.991579][ T9235] RIP: 0033:0x45c829 [ 2136.995475][ T9235] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2137.015070][ T9235] RSP: 002b:00007fb807335c78 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2137.023470][ T9235] RAX: ffffffffffffffda RBX: 00000000004fbd80 RCX: 000000000045c829 [ 2137.031428][ T9235] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000001 [ 2137.039374][ T9235] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2137.048533][ T9235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2137.056481][ T9235] R13: 00000000000008c7 R14: 00000000004d55a0 R15: 00007fb8073366d4 04:44:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x25}, {0x6}]}) [ 2137.110455][ T9235] Mem-Info: [ 2137.121180][ T9235] active_anon:172580 inactive_anon:12316 isolated_anon:0 [ 2137.121180][ T9235] active_file:14753 inactive_file:194924 isolated_file:0 [ 2137.121180][ T9235] unevictable:0 dirty:137 writeback:0 unstable:0 [ 2137.121180][ T9235] slab_reclaimable:17822 slab_unreclaimable:114543 [ 2137.121180][ T9235] mapped:66747 shmem:12550 pagetables:4882 bounce:0 [ 2137.121180][ T9235] free:982730 free_pcp:623 free_cma:0 04:44:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0xfffffffffffffee3) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) sendfile(r0, r1, 0x0, 0x101) 04:44:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r4, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x10c, 0x2, 0x8, 0x401, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0x63}]}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0xfaa3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0xae}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8a}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x10a}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xcb0a}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40881}, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3, 0x4, 0x4}]}, 0x10) [ 2137.242398][ T9235] Node 0 active_anon:690420kB inactive_anon:49264kB active_file:58880kB inactive_file:779696kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266988kB dirty:548kB writeback:0kB shmem:50200kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 407552kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:44:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x10000, 0x80) sendfile(r3, r0, 0x0, 0x101) [ 2137.358682][ T27] audit: type=1326 audit(1588653854.741:19645): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9240 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x55000}]}) [ 2137.416429][ T9235] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:44:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x3, 0x0, 0x0, 0x50000}]}) [ 2137.552067][ T9235] Node 0 DMA free:11808kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:4096kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2137.638478][ T9235] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2137.644264][ T9235] Node 0 DMA32 free:158296kB min:36104kB low:45128kB high:54152kB reserved_highatomic:0KB active_anon:690520kB inactive_anon:49264kB active_file:58880kB inactive_file:775628kB unevictable:0kB writepending:580kB present:3129332kB managed:2600764kB mlocked:0kB kernel_stack:12804kB pagetables:19676kB bounce:0kB free_pcp:1600kB local_pcp:512kB free_cma:0kB 04:44:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) [ 2137.755504][ T9235] lowmem_reserve[]: 0 0 0 0 0 [ 2137.768426][ T9235] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2137.862809][ T9235] lowmem_reserve[]: 0 0 0 0 0 [ 2137.883558][ T9235] Node 1 Normal free:3761216kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 04:44:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0501000000000000000001000000000000000200000000af00180000000062726f6164636173742d6c696e6b0000000000000000000000000000000000000000000000000000000000000000000000002000"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x500, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x800) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendfile(r5, r4, 0x0, 0x101) [ 2137.962010][ T9235] lowmem_reserve[]: 0 0 0 0 0 [ 2137.981538][ T9235] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 2*4096kB (UM) = 11808kB [ 2137.997151][ T27] audit: type=1326 audit(1588653855.371:19646): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9240 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x2f}, {0x6}]}) [ 2138.044139][ T9235] Node 0 DMA32: 5259*4kB (UME) 985*8kB (UME) 589*16kB (UME) 735*32kB (UME) 274*64kB (UME) 97*128kB (UME) 88*256kB (UME) 46*512kB (UME) 20*1024kB (UM) 0*2048kB 0*4096kB = 158372kB [ 2138.083120][ T27] audit: type=1326 audit(1588653855.461:19647): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9273 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2138.119799][ T9235] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 04:44:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) [ 2138.134886][ T9235] Node 1 Normal: 100*4kB (UE) 222*8kB (UME) 158*16kB (UME) 85*32kB (UM) 39*64kB (UME) 19*128kB (UME) 6*256kB (UME) 5*512kB (U) 3*1024kB (UME) 3*2048kB (UME) 912*4096kB (M) = 3761216kB [ 2138.173969][ T9235] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2138.185918][ T9235] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 04:44:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000000)) [ 2138.225387][ T9235] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2138.253574][ T9235] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2138.299948][ T9235] 59102 total pagecache pages [ 2138.321921][ T9235] 0 pages in swap cache [ 2138.332764][ T9235] Swap cache stats: add 0, delete 0, find 0/0 [ 2138.346971][ T9235] Free swap = 0kB [ 2138.360989][ T9235] Total swap = 0kB [ 2138.375725][ T9235] 1965979 pages RAM [ 2138.410662][ T9235] 0 pages HighMem/MovableOnly [ 2138.426779][ T9235] 344262 pages reserved [ 2138.435813][ T9235] 0 pages cma reserved 04:44:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = pidfd_getfd(r1, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0xc, 0x0, 0x2}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0xfffffff9, 0x7, 0x4, 0x0, 0x1000, {r3, r4/1000+10000}, {0x2, 0x8, 0x4, 0x7, 0x0, 0x9, "8c4b6abf"}, 0x40000003, 0x4, @offset=0x5, 0x4, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f00000000c0)="8bb1553080b52bd03336b51f172d053c", 0x10) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) tee(r6, r6, 0x6, 0x9) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r7, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r8, r9, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000280)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) setresuid(r7, r9, r10) r11 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) connect$bt_l2cap(r5, &(0x7f0000000140)={0x1f, 0xc61d, @none, 0x81}, 0xe) sendfile(r6, r11, 0x0, 0x101) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x56000}]}) 04:44:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001400)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 04:44:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x80, 0x467}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r8) sendfile(r3, r8, 0x0, 0x107) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2138.902643][ T27] audit: type=1326 audit(1588653856.281:19648): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9273 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x48}, {0x6}]}) 04:44:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) sendfile(r0, r1, 0x0, 0x101) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2139.112924][ T27] audit: type=1326 audit(1588653856.491:19649): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9321 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xc, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x13, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x57000}]}) 04:44:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x101, 0x8, 0x5, 0x8}]}) 04:44:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x15, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2139.901647][ T27] audit: type=1326 audit(1588653857.281:19650): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9321 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x4c}, {0x6}]}) 04:44:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2140.028916][ T27] audit: type=1326 audit(1588653857.411:19651): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9359 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2140.811997][ T27] audit: type=1326 audit(1588653858.191:19652): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9359 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) readahead(r0, 0xbf7, 0x7) 04:44:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8001, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000080)={0x6, 0x80, 0x1, 'queue0\x00', 0x8000}) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) 04:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x68}, {0x6}]}) 04:44:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x59000}]}) [ 2142.123768][ T27] audit: type=1326 audit(1588653859.501:19653): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9376 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1d, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x105) 04:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x21, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) readv(r2, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/225, 0xe1}], 0x2) 04:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x24, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x25, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x28, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000000)={0x5f3, 0x70f1, 0x3, 0x101, 0x9, 0x8, 0x6}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2142.924799][ T27] audit: type=1326 audit(1588653860.301:19654): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9376 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x6c}, {0x6}]}) [ 2143.029141][ T27] audit: type=1326 audit(1588653860.411:19655): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5a000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2d, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x15, 0x0, 0xc5, 0x7}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x30, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x34, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x35, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3d, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:21 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0xfc, 0x0, 0x50000}]}) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x44, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2143.827881][ T27] audit: type=1326 audit(1588653861.211:19656): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x74}, {0x6}]}) [ 2143.958835][ T27] audit: type=1326 audit(1588653861.341:19657): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9466 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5a201}]}) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x45, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x1008, 0x4) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x48, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4d, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) personality(0x200000) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x20}) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x50, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2144.768412][ T27] audit: type=1326 audit(1588653862.142:19658): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9466 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x7a}, {0x6}]}) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x54, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2144.911622][ T27] audit: type=1326 audit(1588653862.292:19659): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9498 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3, 0x9, 0x3f, 0x0, 0x0, 0x9, 0x62c40, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x10000, 0x8000, 0x9, 0x7, 0x2, 0xba, 0x9}, r2, 0x9, r4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5b000}]}) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x60, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x20800, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000080)=0x9) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) r4 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r5 = syz_open_dev$usbmon(0x0, 0x1, 0xc0000) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x0, 0x8012, r5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mmap(&(0x7f0000d87000/0x3000)=nil, 0x3000, 0x0, 0x8012, r4, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x100000001, 0x327802) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x61, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/access\x00', 0x2, 0x0) 04:44:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x64, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2145.691327][ T27] audit: type=1326 audit(1588653863.072:19660): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9498 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x20, 0x50000}]}) 04:44:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0xfc}, {0x6}]}) 04:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x74, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2145.868305][ T27] audit: type=1326 audit(1588653863.252:19661): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9540 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x11, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0xa, 0x6, 0x4, 0x7}, {0x9, 0x2, 0x1f, 0x5}]}) 04:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5f202}]}) 04:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x84, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/4096) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000027c0)={r7}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000080)={r7, @in={{0x2, 0x4e21, @local}}, 0xc2, 0x7f}, 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x87, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x94, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2146.662839][ T27] audit: type=1326 audit(1588653864.042:19662): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9540 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6}]}) 04:44:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0xb0000002}) 04:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x9c, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2146.857677][ T27] audit: type=1326 audit(1588653864.242:19663): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9570 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xa4, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xac, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:24 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x284c00, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000027c0)={r4}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x2, 0x2}, &(0x7f0000000100)=0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)) 04:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xb1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5fa03}]}) 04:44:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7200, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) write(r1, &(0x7f0000000000)="5d0823ce8a47638fbd5c48eea0ef2ce1c5d58891cd592b9c46eae8bef7582a6d1cf04d1863dca9a43b257a56821efc053c208b4b837a0bd681e865f9ee9e3b65bad8de864c9526167d02bbfc5b58afca158c82aa6c2006d3557679003f4a7c36104b3a11bb83ba19d8cc139038cbf6a6e2c7156b5d49092288418f28dedf140611fe391ade09a6f62616482d34cd1c25f98b9589effd03db485a4c868b52afe801e6a96af22f104d52f3be605d740c1b7dd96213b9a5aa0cf840100e984d296ea9fdbcbeab6babe01d58113b5b80e4258253e045", 0xd4) 04:44:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x2}, {0x6}]}) 04:44:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x18bed5, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffff1f, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7}, {0x16, 0x0, 0x0, 0x50000}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r5, 0x10f, 0x86) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f0000000000)=@get={0x1, &(0x7f00000002c0)=""/4096, 0x8001}) 04:44:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2148.054346][ T27] kauditd_printk_skb: 349 callbacks suppressed [ 2148.054354][ T27] audit: type=1326 audit(1588653865.432:20013): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9614 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2148.178521][ T27] audit: type=1326 audit(1588653865.562:20014): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x50000 [ 2148.258028][ T27] audit: type=1326 audit(1588653865.582:20015): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.304639][ T27] audit: type=1326 audit(1588653865.582:20016): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.353246][ T27] audit: type=1326 audit(1588653865.582:20017): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.395501][ T27] audit: type=1326 audit(1588653865.582:20018): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.448559][ T27] audit: type=1326 audit(1588653865.582:20019): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.489034][ T27] audit: type=1326 audit(1588653865.582:20020): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.527592][ T27] audit: type=1326 audit(1588653865.582:20021): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 [ 2148.548900][ T27] audit: type=1326 audit(1588653865.582:20022): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c829 code=0x50000 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x3}, {0x6}]}) 04:44:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x5fc00}]}) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x440000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x8b, 0x1}, @sack_perm, @sack_perm, @mss={0x2, 0x4}, @window={0x3, 0x5, 0x8}, @timestamp, @window={0x3, 0x8, 0x1000}], 0x7) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/ip6_tables_targets\x00') setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x8, 0x4) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1a2, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x600, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x4}, {0x6}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x900, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfff0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000000067bc"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) recvfrom$x25(r4, &(0x7f0000000180), 0x0, 0x10023, &(0x7f00000001c0)={0x9, @remote={[], 0x2}}, 0x12) r5 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x7ff}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x9, 0x4) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x4000000}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0xffff, 0x7, 0x40, 0x9}, {0x5, 0x9, 0x21, 0x80000000}, {0xfffa, 0x9, 0x8, 0xffff}, {0xdf, 0x3f, 0x7, 0x7}, {0x1, 0x80, 0x7f, 0x7ffe}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 04:44:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3f00, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa201, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000)=0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) openat$audio1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio1\x00', 0x10400, 0x0) 04:44:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x5}, {0x6}]}) 04:44:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x41c56, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x100000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) bind$tipc(r0, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x0, 0x4}}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x5, 0x0, [{0x9dd, 0x0, 0x9}, {0xa73329a9321c6a60, 0x0, 0x4}, {0xb0b, 0x0, 0x4}, {0xa4b, 0x0, 0x100000001}, {0x11, 0x0, 0x5}]}) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x200000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x7a, &(0x7f0000000080)={r5}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000027c0)={r5}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e22, 0xc7, @private0={0xfc, 0x0, [], 0x1}, 0x5}}, 0xfffa, 0xe2fe}, 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x300000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50003}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_open_pts(r1, 0x10002) ioctl$KDDELIO(r2, 0x4b35, 0x8275) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x800000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x6}, {0x6}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x20, 0x70bd26, 0x25dfdbfd, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20040000}, 0x40010) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3f000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x40000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000080)=""/135) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x561c0400, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa2010000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x7}, {0x6}]}) 04:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x20000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) fsopen(&(0x7f0000000000)='selinuxfs\x00', 0x0) 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x9, &(0x7f0000000080)=[{0x8001, 0xba, 0x4, 0x2}, {0x2, 0x20, 0x0, 0x80000001}, {0xc58, 0x3f, 0x9c, 0xff}, {0x400, 0xb8, 0x9, 0x9}, {0x56, 0x7, 0xa7, 0x9}, {0xfff, 0x8, 0x9, 0x7fff}, {0x2, 0x1, 0xf9, 0xfffffffd}, {0x0, 0x8, 0x3, 0x7}, {0x20, 0xf9, 0x7f, 0x4}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = dup(0xffffffffffffffff) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x80000001, r1, &(0x7f0000000100)=0x1, 0x4, 0x0) 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x80000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000080)={@multicast2, @loopback}, &(0x7f00000000c0)=0xc) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x4, 0x20, 0x2}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa0cd0000c9ffff, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x100000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2153.310919][ T27] kauditd_printk_skb: 319 callbacks suppressed [ 2153.310927][ T27] audit: type=1326 audit(1588653870.693:20342): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9789 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:30 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100, 0x42c000) mmap$fb(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x80010, r0, 0xb7000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x5, 0x401, 0xe69}}, 0x28) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) 04:44:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x8}, {0x6}]}) [ 2153.498227][ T27] audit: type=1326 audit(1588653870.883:20343): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9828 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x200000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x400000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x600000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x900000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2154.297297][ T27] audit: type=1326 audit(1588653871.683:20344): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9828 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x30, r1, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @multicast1}}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x30}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x34}, 0x1, 0x0, 0x0, 0xc0}, 0x4008040) 04:44:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3000000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x9}, {0x6}]}) 04:44:31 executing program 2: getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r0}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001240)={@broadcast, @multicast2, 0x0}, &(0x7f0000001280)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r6}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r9}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001ac0)={&(0x7f00000012c0)={0x7ec, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x2, 0x9, 0x80, 0x34}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x883}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xffff0001}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x7ec}, 0x1, 0x0, 0x0, 0x40000000}, 0x4000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0x1c, 0x0, 0x0, 0x4000}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2154.484081][ T27] audit: type=1326 audit(1588653871.863:20345): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3f00000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x561c040000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:32 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x5, 0x128, 0x7fff, 0x80, 0x4, 0xb, 0xffff}, 0xe) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r10 = dup(r9) setsockopt$bt_rfcomm_RFCOMM_LM(r10, 0x12, 0x3, 0x0, 0x0) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="c4000000", @ANYRES16=0x0, @ANYBLOB="040028bd7000fbdbdf25020000000c00078008000100", @ANYRES32, @ANYBLOB="0c00060000000000000000000c00060002000000000000000c00040000000000000000040c000200ec0000000000000008000100000000000c00060002000000000000005400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="06000000", @ANYRESDEC=r10, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08e40100001903fe1c1a42ce95e5a614cd658200", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="0c0002000900000000000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40}, 0x24044811) sendfile(r0, 0xffffffffffffffff, 0x0, 0x101) 04:44:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x8010, r1, 0x0) 04:44:32 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x10000101) 04:44:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa201000000000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2155.281479][ T27] audit: type=1326 audit(1588653872.663:20346): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:32 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) prctl$PR_SVE_GET_VL(0x33, 0x141ee) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0xa}, {0x6}]}) 04:44:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffffc90000cda000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@remote={[], 0x0}, 0x2, 'gretap0\x00'}) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r1, 0x8010500c, &(0x7f0000000000)) [ 2155.449787][ T27] audit: type=1326 audit(1588653872.833:20347): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9892 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffffffff00000000, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000040)=0x9) 04:44:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:33 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRESHEX=0x0, @ANYRES16=0x0, @ANYBLOB="080027bd7000fbdbdf2507000000080005000080000008000600000000000800040008f4ff0008000400e3cc4522"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) sendmsg$nl_generic(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4080}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00cbd7437d94baf6af8214000027bd7000ffdbdf2510000000"], 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x20048000) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r9 = dup(r8) setsockopt$bt_rfcomm_RFCOMM_LM(r9, 0x12, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r9, 0x10e, 0x8, &(0x7f0000000100)=0x8, 0x4) dup(r7) ioctl$FICLONE(r1, 0x40049409, r7) 04:44:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x1, 0x8001, 0xffff}) 04:44:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x6, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:33 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x801) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2, 0x7ff, 0x72}) [ 2156.239553][ T27] audit: type=1326 audit(1588653873.623:20348): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9892 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0xb}, {0x6}]}) 04:44:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x13, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2156.420122][ T27] audit: type=1326 audit(1588653873.803:20349): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9934 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x14, &(0x7f0000000280)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:34 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) stat(&(0x7f00000000c0)='\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r11 = dup(r10) setsockopt$bt_rfcomm_RFCOMM_LM(r11, 0x12, 0x3, 0x0, 0x0) statx(r11, &(0x7f0000000240)='./file0\x00', 0x800, 0x100, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x7}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x2}, {0x2, 0x3}], {0x4, 0xc}, [{0x8, 0x4, r1}, {0x8, 0x4, r3}, {0x8, 0x8, r5}, {0x8, 0x1, r6}, {0x8, 0xc800a72b91152b51, r8}, {0x8, 0x2, r9}, {0x8, 0x2, r12}], {0x10, 0x1}}, 0x8c, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x5}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2157.223781][ T27] audit: type=1326 audit(1588653874.603:20350): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9934 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0xc}, {0x6}]}) [ 2157.329411][ T27] audit: type=1326 audit(1588653874.713:20351): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:34 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000140)={0x73, &(0x7f00000000c0)="6ca084758f8c02fa477c9841c810ac72f612d4b5ae72f3728d455c5bf40f61ecbbe1e11bdd2e59b1fe7e61c8b990b6cd3edcce9a616e86b9086a1d84cf3ef6d24f7aa1c935716c3dc0e4e363ad1419ca5f287c87744d12f852f630b80a4fff318d61ae2ad3071ccf59baedfbf37036ee9928e7"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000280)=[{0xc, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x496c, 0x0, 0x80, 0x8}, {0x1000, 0x7a, 0x31, 0x3}, {0x3f, 0x4, 0x1f, 0xff}, {0x3, 0x80, 0x20}]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) 04:44:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x6}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendfile(r0, r1, 0x0, 0x101) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x40000, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) preadv(r2, &(0x7f0000000440)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/83, 0x53}, {&(0x7f0000000240)=""/248, 0xf8}, {&(0x7f0000000340)=""/195, 0xc3}], 0x5, 0x100) 04:44:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x1, 0x401}, {0x6, 0x2}], r2}, 0x18, 0x3) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3, 0x3a1240) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) r4 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r4, 0x0, 0x101) fcntl$addseals(r4, 0x409, 0x7) 04:44:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xca07, 0x1, 0x0, 0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x10401, 0x4a) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0x1) 04:44:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) flock(r4, 0x0) dup(r2) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x15) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) dup3(r2, r7, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)) 04:44:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0xd}, {0x6}]}) 04:44:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x10c, r1, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x40, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x326}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200400}]}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbab000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_NET={0x6c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x92bc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe32}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3fe0000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffff00}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x24000004}, 0x20048040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000300)={0x2}) [ 2158.370925][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 2158.370933][ T27] audit: type=1326 audit(1588653875.753:20355): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9970 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x13}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x14}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x15}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2159.041569][ T27] audit: type=1326 audit(1588653876.423:20356): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9994 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0xe}, {0x6}]}) 04:44:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2159.221866][ T27] audit: type=1326 audit(1588653876.603:20357): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10025 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2159.283697][ T27] audit: type=1326 audit(1588653876.663:20358): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10027 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:36 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, r6, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)={0x5e8, 0x3f, 0x21, 0x70bd28, 0xa5dfdbfb}, 0x90}, {&(0x7f00000015c0)={0x0, 0x18, 0x100, 0x70bd2d, 0x25dfdbff, "", [@nested={0x0, 0x1d, 0x0, 0x1, [@generic="ee16a1c88ffa84c0a09d9d8658e95565ede3212dd3097c64f5bd8a410e60df760a30db8c4466461f33f951b0540b0f455fda47d1971af2422979af29221713968ad73c727b9e5e441aa71e9c61829cab1a512e42e1963e6130251de802fd9f6112bec8aa5b52fa66d1881c23952be6114b3cb2751970b4b32178a63ce422ad12fed68aaeeacc78a7352c", @typed={0x0, 0x73, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x0, 0x8d, 0x0, 0x0, @pid}]}, @generic="c223afed07d2f8bcaefb94635ec19dda79a23edcaf01f982c36cbf3d91119aedca8d940ad6b89493b6ca149eb06b868e70e9c7bdaec58bc150e7e6cd8e188601c9a4ff5df0a9a8d0aefdba01fc968f52e26fb97be9c9c315082931c85b0139007486782c387e2f8862dcb73c", @typed={0x0, 0x23, 0x0, 0x0, @fd}, @typed={0x0, 0x5e, 0x0, 0x0, @uid}]}}, {&(0x7f0000000440)={0x0, 0x19, 0x8, 0x70bd2c, 0x25dfdbff, "", [@generic="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", @generic="a0ab9dfaf4"]}}, {&(0x7f0000001480)={0x0, 0x2b, 0x2, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x0, 0x1d, 0x0, 0x0, @pid=r4}, @nested={0x0, 0x85, 0x0, 0x1, [@typed={0x0, 0x53}]}, @typed={0x0, 0x75, 0x0, 0x0, @ipv4=@empty}, @typed={0x0, 0x4a, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}], 0x1, &(0x7f00000001c0)=[@cred={{0x0, 0x1, 0x2, {0x0, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r6, r7}}}], 0x70, 0x8090}, 0x1396e42fbe380878) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000080)={{0x7, 0x80}, 'port0\x00', 0x87, 0x0, 0x29, 0xfca0, 0x4, 0x3ff, 0x8, 0x0, 0x1, 0x2}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r11 = dup(r10) setsockopt$bt_rfcomm_RFCOMM_LM(r11, 0x12, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r11, 0x10e, 0x6, &(0x7f0000000000)={0x4, 0x400, 0x4, 0x3}, 0x10) [ 2159.995239][ T27] audit: type=1326 audit(1588653877.373:20359): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10025 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x819d}]}) [ 2160.085999][ T27] audit: type=1326 audit(1588653877.473:20360): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10027 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x5) 04:44:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x10}, {0x6}]}) 04:44:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x2, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r9}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2100006}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x329, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x40}}, 0x200000a0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000002c0)={"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"}) [ 2161.156501][ T27] audit: type=1326 audit(1588653878.543:20361): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10046 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) r5 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r5, 0xaea3) 04:44:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x1d}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) inotify_init1(0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) fcntl$setown(r3, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r5 = pidfd_open(r4, 0x0) pidfd_getfd(r5, 0xffffffffffffffff, 0x700000000000000) r6 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r6, 0x0, 0x101) 04:44:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x21}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x24}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x25}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2161.945594][ T27] audit: type=1326 audit(1588653879.333:20362): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10046 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:39 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000040)) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x20, 0x0, 0x2}}, 0x14) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x7a, &(0x7f0000000080)={r6}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000027c0)={r6}, &(0x7f0000002800)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x4, 0xfffff001, 0x2, r6}, &(0x7f00000000c0)=0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x11}, {0x6}]}) 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x28}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2c}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2162.129340][ T27] audit: type=1326 audit(1588653879.513:20363): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10082 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x2d}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x30}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x34}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x35}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2162.926000][ T27] audit: type=1326 audit(1588653880.314:20364): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10082 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:41 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:41 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x2, 0x4) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000000)=r3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x12}, {0x6}]}) 04:44:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="465575e739378248af1d3b", @ANYRES16=r2, @ANYBLOB="00012cbd7000fcdbdf2505007d0bff000100008000000000000c0004000163ffffffc9f454668384b3ff81100e2ead1bff3082763480dc8eba921ffeecc4bbd27cb1f744d7a2e722b79c3860"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x16) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2108008}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="02002abd7000fbdbdf25040000000c0005000100000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x50}, 0x40000) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$TCSETXW(r4, 0x5435, &(0x7f0000000140)={0x7, 0xfff, [0xfbff, 0x8001, 0x7fff, 0x1, 0x200], 0x7}) [ 2164.520758][ T27] audit: type=1326 audit(1588653881.904:20366): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10112 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 [ 2164.582168][ T27] audit: type=1326 audit(1588653881.904:20365): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10114 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:42 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x89c, 0x101001) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r7) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x3, 0xb, 0x4, 0x3200000, 0xfffffff9, {r8, r9/1000+60000}, {0x4, 0x1, 0x4a, 0x1, 0x3, 0x4, ']s.\v'}, 0x9, 0x3, @planes=&(0x7f00000000c0)={0x0, 0xd9c, @userptr=0x2, 0x1000}, 0x1, 0x0, 0xffffffffffffffff}) sendfile(r10, r4, 0x0, 0x101) 04:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) sendto$netrom(r3, &(0x7f0000000040)="f4faaf56da9169b267597b58a9", 0xd, 0x20, &(0x7f0000000080)={{0x3, @bcast, 0x8}, [@bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 04:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r1 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x401) 04:44:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) set_mempolicy(0x8000, &(0x7f0000000000), 0xffffffffffffffc1) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f0000000080)='([:posix_acl_accessvboxnet0\x00', &(0x7f00000000c0)="431de56c0b4019e080f1d7db98d16e427c685d1a7a6f272e07ad11a3dae3fc5fc403237f315aebd3028f5f7753a26f56531310a45dc25d618908668e1ed92fbd6a1f16362a694f46c7217af8a75f57639175e3014f916b26e784904b270d34336d80d66bdc3878f1ff14bc1d2591ca75553eb6adf1611546937895eccbfac525281c411d9471bd155a90d37d924a19ccfc1973a38b550f5523e404f2a967e3a816662706a16c74c152ee1fe73dc4ec3a26e14721b1f763b51df97ab0871cb2f26a022d2bc74ce9170fcc68caa4a7f7b8f2a7cb903b34fa82f1ce66cbb67d7ff0", 0xe0) 04:44:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x6, &(0x7f0000000080)=[{0x3, 0xff, 0xce, 0x8}, {0x5, 0x7f, 0x20, 0x400}, {0x7fff, 0x1a, 0xf8, 0x2}, {0x3, 0x4, 0x2, 0x401}, {0x1ff, 0x1f, 0x81, 0x4}, {0x7f, 0x9, 0x0, 0x5}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000000c0)={{0x3c, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x1, 'dh\x00', 0x20, 0x4, 0x4d}, {@private=0xa010100, 0x4e21, 0x2000, 0x1, 0x4, 0xae20}}, 0x44) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 04:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000240)) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) mq_timedreceive(r3, &(0x7f0000000380)=""/152, 0x98, 0x8, &(0x7f0000000480)={r5, r6+10000000}) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x7}, @NL80211_ATTR_MAC={0xa, 0x6, @random="2a7cd4e8194e"}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendfile(r0, r1, 0x0, 0x101) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r9 = dup(r8) setsockopt$bt_rfcomm_RFCOMM_LM(r9, 0x12, 0x3, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f0000000040)="8c4cbee84a35ea33912477cd4d97301d", &(0x7f0000000080)=""/243, &(0x7f0000000180), &(0x7f00000004c0)="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", 0x0, r9, 0x4}, 0x38) 04:44:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x8, 0x0, 0x50000}]}) 04:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000140)=0x5) r5 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r0, r1, 0x0, 0x101) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, 0x0, 0x0) ioctl$KVM_SET_PIT2(r7, 0x4070aea0, &(0x7f0000000040)={[{0x7, 0x2, 0x40, 0x9, 0x3, 0x7f, 0x5, 0x8, 0x99, 0x5, 0x60, 0x7f, 0x4}, {0xfffffffe, 0x8, 0xd6, 0x5, 0x0, 0x0, 0xc, 0x8, 0x0, 0x80, 0x2, 0x80}, {0x5, 0x3, 0x1f, 0x6e, 0x80, 0xbc, 0x5, 0x4c, 0x6, 0x0, 0x7, 0x1f, 0x10000}], 0x94}) [ 2165.320024][ T27] audit: type=1326 audit(1588653882.704:20367): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10112 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3d}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x25}, {0x6}]}) 04:44:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50001}]}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = geteuid() ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000000)={0x3, @null, r2}) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8000, 0x4000) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000140)) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 04:44:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) [ 2165.505318][ T27] audit: type=1326 audit(1588653882.894:20368): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10160 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x44}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x1b}, 0x9}}}, 0x84) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x101) 04:44:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) fcntl$setflags(r1, 0x2, 0x1) r2 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, &(0x7f0000000000)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) accept$inet(r8, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) write$UHID_SET_REPORT_REPLY(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x101) socket$nl_route(0x10, 0x3, 0x0) 04:44:43 executing program 2: getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000), 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xb}, {0x46, 0x0, 0x0, 0x3}]}) 04:44:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x45}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:43 executing program 4: link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x3c}}, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r9) ioctl$ifreq_SIOCGIFINDEX_wireguard(r9, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7fffffff, 0x2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x840}, 0x20000001) write$P9_RREAD(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="680000007502006e000000772a3fd3cf34d31ee52096e6a3fee47677cd7c6460c7766b3c9438612c67da8441b695ddd632808a40a74d3aa4f75001c34ca614632d078fd761c8bf95f8bb07562ca0878a9115fd90543ab02e73520b4e7e4b707c9fc24281b4f01c74a674311f8e738a3381d72e066fcd6b2850"], 0x79) r11 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r11, 0x0, 0x101) 04:44:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x48}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4c}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2166.296085][ T27] audit: type=1326 audit(1588653883.684:20369): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10160 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x2f}, {0x6}]}) 04:44:43 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x8000, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000080)={0x9, 0x7f, 0xf5}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r1, r2, 0x0, 0x101) 04:44:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x4d}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2166.439058][ T27] audit: type=1326 audit(1588653883.824:20370): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10204 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc, 0x2, 0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x50}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:44 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000000)=""/45, 0x2d}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) recvfrom$l2tp6(r2, &(0x7f00000001c0)=""/146, 0x92, 0x40000002, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, 0x20) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f00000000c0)=""/232) 04:44:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, [], [{0x9, 0x800, 0x100000000000, 0x2, 0x6c1, 0x65f9}, {0x3, 0x8, 0x6, 0x1, 0x1010000000000, 0x1000}], [[], [], [], []]}) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) r4 = dup(0xffffffffffffffff) r5 = open(&(0x7f0000000000)='./file0\x00', 0x80011f1043, 0x104) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, r6, 0x0) r7 = socket(0x10, 0x2, 0x0) tkill(0x0, 0x15) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000340)={{0x0, 0x6, 0x1f00000, 0x2, 'syz0\x00', 0x5}, 0x4, 0x4, 0xb2, 0x0, 0x3, 0x6, 'syz0\x00', &(0x7f0000000300)=['/sys/fs/smackfs/cipso2\x00', 'syz2\x00', '-\x00'], 0x1e, [], [0x3, 0x0, 0x1, 0x5]}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) fchown(r4, r6, r8) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) sendmsg$IPSET_CMD_TEST(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0xb, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x89e8}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40040) sendfile(r0, r1, 0x0, 0x101) 04:44:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x54}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000008, 0x400c070, r1, 0x7000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040)=0x28, 0x4) r3 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r3, 0x0, 0x101) 04:44:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x5c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x34, &(0x7f0000000000)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000100)={'filter\x00', 0x7, 0x4, 0x418, 0x110, 0x0, 0x110, 0x330, 0x330, 0x330, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4, 0xffffffff}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @multicast2, @rand_addr=0x64010101, 0x1}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0xffffffff, 0xffffffff, 0x6, 0x4, {@empty, {[0x0, 0xff, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x1, 0x401, 0xff, 0xfffb, 0x7, 0x40, 'netpci0\x00', 'erspan0\x00', {}, {0xff}, 0x0, 0x1}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x29}, @mac=@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0x803e5f91f613e065, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x468) 04:44:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x60}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2167.240800][ T27] audit: type=1326 audit(1588653884.624:20371): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10204 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x30}, {0x6}]}) 04:44:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) ioctl$FIONCLEX(r4, 0x5450) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="7df70000000000e5cc0010"], 0x14}}, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r8, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x11}, 0x20000010) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xbc, r7, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20000000}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffeff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x8000}, 0x8004) r9 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r9, 0x12, 0x3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r4, 0x3, 0x4, r9}, 0x14) r10 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r10, 0x0, 0x101) 04:44:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x61}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x8, 0x0, 0x50000}]}) [ 2167.367054][ T27] audit: type=1326 audit(1588653884.754:20372): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10250 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:44 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000080)=0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x101) [ 2168.175021][ T27] audit: type=1326 audit(1588653885.564:20373): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10250 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x48}, {0x6}]}) 04:44:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x64}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0xb2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r6 = dup(r0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) r10 = dup(r9) setsockopt$bt_rfcomm_RFCOMM_LM(r10, 0x12, 0x3, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0xfdf3) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e21, 0x20000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}, &(0x7f0000000200)=0xbb) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r10, 0xffffffffffffffff, 0x0, 0x101) 04:44:47 executing program 2: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000000)) [ 2169.737791][ T27] audit: type=1326 audit(1588653887.124:20374): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10268 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x6c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) 04:44:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x101) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x40001) 04:44:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x74}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xe4e) 04:44:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x7fff, 0x2, 0x4, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r5, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_macvtap\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000001}, 0x804) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 04:44:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x7c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000001c0)={0x3, 0x9, 0x0, 0x5, 0x9, 0x1f}) r3 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r3, 0x0, 0x101) r4 = semget$private(0x0, 0x3, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="7df7000000000000000010"], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x24000001}, 0x8000) semop(r4, &(0x7f0000000040)=[{0x4, 0x1, 0x1000}, {0x2, 0x4, 0x1000}], 0x2) [ 2170.542691][ T27] audit: type=1326 audit(1588653887.924:20375): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10268 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x4c}, {0x6}]}) 04:44:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 04:44:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)) 04:44:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x84}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:48 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x4) [ 2170.667424][ T27] audit: type=1326 audit(1588653888.054:20376): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10316 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:48 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000040)={0x3, {0x2, 0x82c, 0x80000001, 0x7fff}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) r4 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000540)='/sys/fs/smackfs/ptrace\x00', 0x2, 0x0) sendfile(r0, r4, 0x0, 0x1778c0) 04:44:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x87}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:48 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x5) 04:44:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = pkey_alloc(0x0, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x84280, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000080)=""/222) pkey_free(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) ioctl$int_out(r2, 0x2, &(0x7f0000000180)) [ 2171.040473][T10339] ================================================================== [ 2171.049229][T10339] BUG: KASAN: slab-out-of-bounds in vsscanf+0x2666/0x2ef0 [ 2171.056326][T10339] Read of size 1 at addr ffff888096c15407 by task syz-executor.4/10339 [ 2171.064543][T10339] [ 2171.066873][T10339] CPU: 0 PID: 10339 Comm: syz-executor.4 Not tainted 5.7.0-rc4-syzkaller #0 [ 2171.075985][T10339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2171.086019][T10339] Call Trace: [ 2171.089307][T10339] dump_stack+0x1e9/0x30e [ 2171.093967][T10339] print_address_description+0x74/0x5c0 [ 2171.099499][T10339] ? printk+0x62/0x83 [ 2171.103458][T10339] ? default_file_splice_write+0x112/0x1b0 [ 2171.109240][T10339] ? vprintk_emit+0x339/0x3c0 [ 2171.113893][T10339] __kasan_report+0x103/0x1a0 [ 2171.118550][T10339] ? vsscanf+0x2666/0x2ef0 [ 2171.122967][T10339] ? vsscanf+0x2666/0x2ef0 [ 2171.127632][T10339] kasan_report+0x4d/0x80 [ 2171.131939][T10339] ? vsscanf+0x2666/0x2ef0 [ 2171.136340][T10339] ? vsscanf+0x5df/0x2ef0 [ 2171.140652][T10339] ? sscanf+0x6c/0x90 [ 2171.144623][T10339] ? smk_set_cipso+0x1e4/0x6a0 [ 2171.149359][T10339] ? vsscanf+0x11af/0x2ef0 [ 2171.153767][T10339] ? smk_set_cipso+0x219/0x6a0 [ 2171.158513][T10339] ? mark_lock+0x102/0x1b00 [ 2171.163008][T10339] ? smk_write_access2+0x1c0/0x1c0 [ 2171.168115][T10339] ? __vfs_write+0xa7/0x710 [ 2171.172598][T10339] ? _raw_spin_unlock_irqrestore+0xb4/0xd0 [ 2171.178383][T10339] ? __kernel_write+0x120/0x350 [ 2171.183215][T10339] ? write_pipe_buf+0xf9/0x150 [ 2171.187972][T10339] ? __splice_from_pipe+0x329/0x870 [ 2171.193155][T10339] ? default_file_splice_write+0x1b0/0x1b0 [ 2171.198939][T10339] ? default_file_splice_write+0x112/0x1b0 [ 2171.204727][T10339] ? splice_direct_to_actor+0x482/0xb40 [ 2171.210251][T10339] ? do_splice_direct+0x340/0x340 [ 2171.215266][T10339] ? do_splice_direct+0x201/0x340 [ 2171.220293][T10339] ? do_sendfile+0x809/0xfe0 [ 2171.224886][T10339] ? __x64_sys_sendfile64+0x164/0x1a0 [ 2171.230321][T10339] ? do_syscall_64+0x19/0x1b0 [ 2171.234975][T10339] ? do_syscall_64+0xf3/0x1b0 [ 2171.239648][T10339] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2171.245869][T10339] [ 2171.248181][T10339] Allocated by task 10339: [ 2171.252573][T10339] __kasan_kmalloc+0x114/0x160 [ 2171.257313][T10339] __kmalloc_track_caller+0x249/0x320 [ 2171.262656][T10339] memdup_user_nul+0x26/0xf0 [ 2171.267223][T10339] smk_set_cipso+0xff/0x6a0 [ 2171.271789][T10339] __vfs_write+0xa7/0x710 [ 2171.276105][T10339] __kernel_write+0x120/0x350 [ 2171.280769][T10339] write_pipe_buf+0xf9/0x150 [ 2171.285505][T10339] __splice_from_pipe+0x329/0x870 [ 2171.290516][T10339] default_file_splice_write+0x112/0x1b0 [ 2171.296121][T10339] splice_direct_to_actor+0x482/0xb40 [ 2171.301464][T10339] do_splice_direct+0x201/0x340 [ 2171.306295][T10339] do_sendfile+0x809/0xfe0 [ 2171.310685][T10339] __x64_sys_sendfile64+0x164/0x1a0 [ 2171.315878][T10339] do_syscall_64+0xf3/0x1b0 [ 2171.320369][T10339] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2171.326237][T10339] [ 2171.328551][T10339] Freed by task 4115: [ 2171.332621][T10339] __kasan_slab_free+0x125/0x190 [ 2171.337546][T10339] kfree+0x10a/0x220 [ 2171.341447][T10339] tomoyo_path_perm+0x59b/0x740 [ 2171.346355][T10339] security_inode_getattr+0xc0/0x140 [ 2171.351636][T10339] vfs_getattr+0x27/0x6e0 [ 2171.355962][T10339] __se_sys_newlstat+0x85/0x140 [ 2171.361682][T10339] do_syscall_64+0xf3/0x1b0 [ 2171.366254][T10339] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2171.372206][T10339] [ 2171.374514][T10339] The buggy address belongs to the object at ffff888096c15400 [ 2171.374514][T10339] which belongs to the cache kmalloc-32 of size 32 [ 2171.388392][T10339] The buggy address is located 7 bytes inside of [ 2171.388392][T10339] 32-byte region [ffff888096c15400, ffff888096c15420) [ 2171.401375][T10339] The buggy address belongs to the page: [ 2171.407086][T10339] page:ffffea00025b0540 refcount:1 mapcount:0 mapping:0000000025d94b4e index:0xffff888096c15fc1 [ 2171.417475][T10339] flags: 0xfffe0000000200(slab) [ 2171.422302][T10339] raw: 00fffe0000000200 ffffea0002a203c8 ffffea00023a86c8 ffff8880aa4001c0 [ 2171.430877][T10339] raw: ffff888096c15fc1 ffff888096c15000 000000010000002a 0000000000000000 [ 2171.439603][T10339] page dumped because: kasan: bad access detected [ 2171.445987][T10339] [ 2171.448391][T10339] Memory state around the buggy address: [ 2171.453997][T10339] ffff888096c15300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2171.462031][T10339] ffff888096c15380: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2171.470342][T10339] >ffff888096c15400: 06 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 2171.478387][T10339] ^ [ 2171.482446][T10339] ffff888096c15480: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2171.490483][T10339] ffff888096c15500: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2171.498516][T10339] ================================================================== [ 2171.506568][T10339] Disabling lock debugging due to kernel taint [ 2171.527212][ T27] audit: type=1326 audit(1588653888.915:20377): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10316 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x16, 0x0, 0x0, 0x50}, {0x6}]}) 04:44:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x94}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2171.620497][ T27] audit: type=1326 audit(1588653889.005:20378): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10345 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 04:44:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xc}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r1, 0xc0045004, &(0x7f0000000000)) 04:44:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x9c}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xa4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xac}, {0x6, 0x0, 0x0, 0x50000}]}) 04:44:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0x3}, {0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)={0x7c, r6, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x40}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r3, r2}, &(0x7f0000000440)=""/239, 0xef, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) r7 = add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$instantiate(0xc, r3, &(0x7f0000000080)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'mime_type', 0x20, 0x7}, 0x33, r7) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x1, 0x4) 04:44:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000280)=[{0xb1}, {0x6, 0x0, 0x0, 0x50000}]}) [ 2172.054443][T10339] Kernel panic - not syncing: panic_on_warn set ... [ 2172.061242][T10339] CPU: 1 PID: 10339 Comm: syz-executor.4 Tainted: G B 5.7.0-rc4-syzkaller #0 [ 2172.071393][T10339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2172.082241][T10339] Call Trace: [ 2172.085909][T10339] dump_stack+0x1e9/0x30e [ 2172.090242][T10339] panic+0x264/0x7a0 [ 2172.094335][T10339] ? trace_hardirqs_on+0x30/0x70 [ 2172.099278][T10339] __kasan_report+0x191/0x1a0 [ 2172.103951][T10339] ? vsscanf+0x2666/0x2ef0 [ 2172.108362][T10339] ? vsscanf+0x2666/0x2ef0 [ 2172.112801][T10339] kasan_report+0x4d/0x80 [ 2172.117136][T10339] ? vsscanf+0x2666/0x2ef0 [ 2172.121550][T10339] ? vsscanf+0x5df/0x2ef0 [ 2172.125883][T10339] ? sscanf+0x6c/0x90 [ 2172.129858][T10339] ? smk_set_cipso+0x1e4/0x6a0 [ 2172.134614][T10339] ? vsscanf+0x11af/0x2ef0 [ 2172.139123][T10339] ? smk_set_cipso+0x219/0x6a0 [ 2172.143890][T10339] ? mark_lock+0x102/0x1b00 [ 2172.148389][T10339] ? smk_write_access2+0x1c0/0x1c0 [ 2172.153491][T10339] ? __vfs_write+0xa7/0x710 [ 2172.157999][T10339] ? _raw_spin_unlock_irqrestore+0xb4/0xd0 [ 2172.163809][T10339] ? __kernel_write+0x120/0x350 [ 2172.168748][T10339] ? write_pipe_buf+0xf9/0x150 [ 2172.173507][T10339] ? __splice_from_pipe+0x329/0x870 [ 2172.178704][T10339] ? default_file_splice_write+0x1b0/0x1b0 [ 2172.184516][T10339] ? default_file_splice_write+0x112/0x1b0 [ 2172.190327][T10339] ? splice_direct_to_actor+0x482/0xb40 [ 2172.195963][T10339] ? do_splice_direct+0x340/0x340 [ 2172.200983][T10339] ? do_splice_direct+0x201/0x340 [ 2172.206125][T10339] ? do_sendfile+0x809/0xfe0 [ 2172.212293][T10339] ? __x64_sys_sendfile64+0x164/0x1a0 [ 2172.217755][T10339] ? do_syscall_64+0x19/0x1b0 [ 2172.222430][T10339] ? do_syscall_64+0xf3/0x1b0 [ 2172.227300][T10339] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2172.234089][T10339] Kernel Offset: disabled [ 2172.238462][T10339] Rebooting in 86400 seconds..