r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:06 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4002}]) 19:46:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:06 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:07 executing program 0: socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x332, 0x0) 19:46:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4004}]) 19:46:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @local}, &(0x7f0000000240)=0xc) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000000000000000007e00000000000000410000000000000000000000fa0000000000000045ea00"/92]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f0000000000000000000000000000a551000000000000000000000000000000000000000700"/92]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="befeffff7d00000005fa000000000000000000000000000000000000000000000000000000000000000000000000000000001f00046e6f64657673656c66776d643573756d5b76626f786e657430707070302517007070703170726f63766d6e657431dd29776c616e302b5d91006367726f757070707031285c183f82751aacf2de8cca2560c6fb302e25903ec34b647d44210b25bfc20dc5e8a02a2df85b52f46d9346b7af1300e8b57db45087c06eedb2cd8448b0682801bff8c8fae1a18540ac3258e43127544a83b3f2c812663635660444fcfcb27de5bfe6916b8f829172c0cc08ffdfdacc37a46e404f33bdb64145a1d6218d178ba3b3f0bdb7554800000a002f6465762f6e62642300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) [ 678.733330] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 678.738352] loop4: partition table partially beyond EOD, truncated [ 678.763554] loop4: p1 start 1 is beyond EOD, truncated [ 678.773787] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 678.782341] loop4: p3 size 2 extends beyond EOD, truncated [ 678.800115] loop4: p4 size 32768 extends beyond EOD, truncated [ 678.813969] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 678.835961] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:07 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500090001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:07 executing program 0: socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x332, 0x0) 19:46:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4007}]) 19:46:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\xff', 0x0, 0x0) 19:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000240)=0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:07 executing program 0: socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x332, 0x0) 19:46:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x400a}]) 19:46:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\xf6', 0x0, 0x0) [ 679.442622] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 679.453855] loop4: partition table partially beyond EOD, truncated 19:46:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 679.515763] loop4: p1 start 1 is beyond EOD, truncated [ 679.550597] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 679.604563] loop4: p3 size 2 extends beyond EOD, truncated [ 679.626516] loop4: p4 size 32768 extends beyond EOD, truncated [ 679.673889] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 679.749296] loop4: p6 size 32768 extends beyond EOD, truncated [ 679.820222] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 679.825928] print_req_error: 210 callbacks suppressed [ 679.825938] print_req_error: I/O error, dev loop4, sector 0 [ 679.827286] print_req_error: I/O error, dev loop4, sector 0 [ 679.832778] print_req_error: I/O error, dev loop4, sector 0 [ 679.839727] print_req_error: I/O error, dev loop4, sector 0 [ 679.849198] print_req_error: I/O error, dev loop4, sector 0 [ 679.851960] print_req_error: I/O error, dev loop4, sector 0 [ 679.855241] buffer_io_error: 190 callbacks suppressed [ 679.855251] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 679.855424] print_req_error: I/O error, dev loop4, sector 0 [ 679.866846] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 679.866895] print_req_error: I/O error, dev loop4, sector 0 [ 679.866909] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 679.867083] print_req_error: I/O error, dev loop4, sector 0 [ 679.879679] Buffer I/O error on dev loop4p2, logical block 0, async page read 19:46:08 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105000a0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x402c}]) [ 679.879724] print_req_error: I/O error, dev loop4, sector 0 [ 679.879737] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 679.884812] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 679.919334] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 679.932620] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 679.932663] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 679.932701] Buffer I/O error on dev loop4p6, logical block 0, async page read 19:46:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 19:46:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 19:46:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4033}]) 19:46:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 680.324351] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 680.349929] loop4: partition table partially beyond EOD, truncated [ 680.378356] loop4: p1 start 1 is beyond EOD, truncated [ 680.480085] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 680.555899] loop4: p3 size 2 extends beyond EOD, truncated [ 680.568492] loop4: p4 size 32768 extends beyond EOD, truncated [ 680.586291] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 680.595145] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:09 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105130e0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x7, 0x4d0b}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:09 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 19:46:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x403b}]) 19:46:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4002}]) 19:46:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x403c}]) 19:46:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 681.111897] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 681.163802] loop4: partition table partially beyond EOD, truncated [ 681.196276] loop4: p1 start 1 is beyond EOD, truncated [ 681.229775] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 681.260310] loop4: p3 size 2 extends beyond EOD, truncated [ 681.276595] loop4: p4 size 32768 extends beyond EOD, truncated [ 681.288388] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 681.317045] loop4: p6 size 32768 extends beyond EOD, truncated [ 681.411820] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 19:46:10 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050e130001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x2, 0xfffffffd}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4060}]) 19:46:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) 19:46:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4, 0x0) 19:46:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x40e0}]) 19:46:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 681.917844] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 681.967696] loop4: partition table partially beyond EOD, truncated [ 682.000171] loop4: p1 start 1 is beyond EOD, truncated [ 682.022061] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 682.077514] loop4: p3 size 2 extends beyond EOD, truncated [ 682.103882] loop4: p4 size 32768 extends beyond EOD, truncated [ 682.113388] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 682.121952] loop4: p6 size 32768 extends beyond EOD, truncated [ 682.201326] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 682.284937] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 682.295015] loop4: partition table partially beyond EOD, truncated [ 682.301944] loop4: p1 start 1 is beyond EOD, truncated [ 682.307284] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 682.318258] loop4: p3 size 2 extends beyond EOD, truncated [ 682.325059] loop4: p4 size 32768 extends beyond EOD, truncated [ 682.332158] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 682.350454] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:10 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010503190001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10, 0x0) 19:46:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1060000, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x4, r5, 0x0, 0x2, @in6={0xa, 0x4e21, 0xbfb, @local}}}, 0xa0) 19:46:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x7605}]) 19:46:10 executing program 0 (fault-call:9 fault-nth:0): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x6b6b6b, 0x0) [ 682.600152] FAULT_INJECTION: forcing a failure. [ 682.600152] name failslab, interval 1, probability 0, space 0, times 0 19:46:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1000000, 0x0) [ 682.796635] CPU: 1 PID: 10865 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 682.803743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.813113] Call Trace: [ 682.815724] dump_stack+0x172/0x1f0 [ 682.819376] should_fail.cold+0xa/0x1b [ 682.823298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 682.828439] ? lock_downgrade+0x880/0x880 [ 682.832621] __should_failslab+0x121/0x190 [ 682.836870] should_failslab+0x9/0x14 [ 682.840675] kmem_cache_alloc_node+0x26c/0x710 [ 682.840703] __alloc_skb+0xd5/0x5f0 [ 682.840717] ? skb_scrub_packet+0x490/0x490 [ 682.840736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.840830] ? netlink_autobind.isra.0+0x228/0x310 [ 682.840848] netlink_sendmsg+0x97b/0xd70 [ 682.853364] ? netlink_unicast+0x720/0x720 [ 682.872101] ? selinux_socket_sendmsg+0x36/0x40 [ 682.876789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.882345] ? security_socket_sendmsg+0x8d/0xc0 [ 682.887121] ? netlink_unicast+0x720/0x720 [ 682.891395] sock_sendmsg+0xd7/0x130 19:46:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) write$vhci(r0, &(0x7f0000000240)=@HCI_VENDOR_PKT={0xff, 0x102}, 0x2) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000000, 0x0) [ 682.895126] ___sys_sendmsg+0x3e2/0x920 [ 682.899110] ? copy_msghdr_from_user+0x430/0x430 [ 682.903883] ? lock_downgrade+0x880/0x880 [ 682.908054] ? kasan_check_read+0x11/0x20 [ 682.912219] ? __fget+0x367/0x540 [ 682.915700] ? iterate_fd+0x360/0x360 [ 682.919517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.925059] ? proc_fail_nth_write+0x9d/0x1e0 [ 682.929547] ? __fget_light+0x1a9/0x230 [ 682.933643] ? __fdget+0x1b/0x20 [ 682.937002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.942549] ? sockfd_lookup_light+0xcb/0x180 [ 682.947037] __sys_sendmmsg+0x1bf/0x4e0 [ 682.951021] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 682.955373] ? kasan_check_write+0x14/0x20 [ 682.959626] ? __sb_end_write+0xd9/0x110 [ 682.963687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.969227] ? fput+0x128/0x1a0 [ 682.972515] ? ksys_write+0x1f1/0x2d0 [ 682.976316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.981127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.985873] ? do_syscall_64+0x26/0x620 [ 682.989849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.995212] ? do_syscall_64+0x26/0x620 [ 682.999181] __x64_sys_sendmmsg+0x9d/0x100 [ 683.003411] do_syscall_64+0xfd/0x620 [ 683.007206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.012396] RIP: 0033:0x459a29 [ 683.015586] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.034476] RSP: 002b:00007f7f93dd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 683.042174] RAX: ffffffffffffffda RBX: 00007f7f93dd6c90 RCX: 0000000000459a29 [ 683.049449] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 683.056721] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 683.063981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93dd76d4 [ 683.071246] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 683.149932] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 683.154497] loop4: partition table partially beyond EOD, truncated [ 683.229139] loop4: p1 start 1 is beyond EOD, truncated [ 683.248132] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 683.279807] loop4: p3 size 2 extends beyond EOD, truncated [ 683.304838] loop4: p4 size 32768 extends beyond EOD, truncated [ 683.326845] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 683.337558] loop4: p6 size 32768 extends beyond EOD, truncated [ 683.413771] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 19:46:12 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105001c0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x20004780}]) 19:46:12 executing program 0 (fault-call:9 fault-nth:1): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000000, 0x0) 19:46:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:12 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, r0, 0x1, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000000, 0x0) 19:46:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f0000000000000000000000000000000000cd757141ff1f8a22402de500"/103]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='/dev/sequencer\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00') [ 683.597145] FAULT_INJECTION: forcing a failure. [ 683.597145] name failslab, interval 1, probability 0, space 0, times 0 [ 683.650534] CPU: 0 PID: 11073 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 683.657524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.666896] Call Trace: [ 683.669518] dump_stack+0x172/0x1f0 [ 683.673166] should_fail.cold+0xa/0x1b [ 683.677066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 683.682188] ? lock_downgrade+0x880/0x880 [ 683.686374] __should_failslab+0x121/0x190 [ 683.690629] should_failslab+0x9/0x14 [ 683.694447] kmem_cache_alloc_node_trace+0x274/0x720 [ 683.699568] ? __alloc_skb+0xd5/0x5f0 [ 683.703389] __kmalloc_node_track_caller+0x3d/0x80 [ 683.708340] __kmalloc_reserve.isra.0+0x40/0xf0 [ 683.713032] __alloc_skb+0x10b/0x5f0 [ 683.716766] ? skb_scrub_packet+0x490/0x490 [ 683.721117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.726687] ? netlink_autobind.isra.0+0x228/0x310 [ 683.731639] netlink_sendmsg+0x97b/0xd70 [ 683.735752] ? netlink_unicast+0x720/0x720 [ 683.740008] ? selinux_socket_sendmsg+0x36/0x40 [ 683.744689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.750241] ? security_socket_sendmsg+0x8d/0xc0 [ 683.755017] ? netlink_unicast+0x720/0x720 [ 683.759269] sock_sendmsg+0xd7/0x130 [ 683.763006] ___sys_sendmsg+0x3e2/0x920 [ 683.767012] ? copy_msghdr_from_user+0x430/0x430 [ 683.771787] ? lock_downgrade+0x880/0x880 [ 683.775956] ? kasan_check_read+0x11/0x20 [ 683.780120] ? __fget+0x367/0x540 [ 683.783585] ? iterate_fd+0x360/0x360 [ 683.787403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.792956] ? proc_fail_nth_write+0x9d/0x1e0 [ 683.797482] ? __fget_light+0x1a9/0x230 19:46:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x6b6b6b00, 0x0) 19:46:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 683.801477] ? __fdget+0x1b/0x20 [ 683.804862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.811374] ? sockfd_lookup_light+0xcb/0x180 [ 683.815935] __sys_sendmmsg+0x1bf/0x4e0 [ 683.819929] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 683.824271] ? kasan_check_write+0x14/0x20 [ 683.828592] ? __sb_end_write+0xd9/0x110 [ 683.832658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.838188] ? fput+0x128/0x1a0 [ 683.841460] ? ksys_write+0x1f1/0x2d0 [ 683.845252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.850096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.854842] ? do_syscall_64+0x26/0x620 [ 683.858849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.864200] ? do_syscall_64+0x26/0x620 [ 683.868199] __x64_sys_sendmmsg+0x9d/0x100 [ 683.873403] do_syscall_64+0xfd/0x620 [ 683.877226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.882421] RIP: 0033:0x459a29 19:46:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f00000000000800000000000000854fd980a29d5a001000000000000000000000000000000000000000a062984ac32f02debdce03000200090000000000000000000000000900001000000000fbff61a49cba008000"/96]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x9, 0x4) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 683.885625] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.904690] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 683.912426] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 683.919709] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 683.927002] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 683.934279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 683.941542] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 684.018268] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 684.073246] loop4: partition table partially beyond EOD, truncated [ 684.096723] loop4: p1 start 1 is beyond EOD, truncated [ 684.104752] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 684.116701] loop4: p3 size 2 extends beyond EOD, truncated [ 684.138960] loop4: p4 size 32768 extends beyond EOD, truncated [ 684.159729] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 684.170590] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:12 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105001f0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2}]) 19:46:12 executing program 0 (fault-call:9 fault-nth:2): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xf6ffffff, 0x0) 19:46:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2) ioctl$SIOCNRDECOBS(r2, 0x89e2) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 684.404424] FAULT_INJECTION: forcing a failure. [ 684.404424] name failslab, interval 1, probability 0, space 0, times 0 [ 684.459524] CPU: 1 PID: 11318 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 684.466528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.475901] Call Trace: [ 684.478541] dump_stack+0x172/0x1f0 [ 684.482211] should_fail.cold+0xa/0x1b [ 684.486129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.491276] ? netlink_deliver_tap+0x146/0xc20 [ 684.495884] __should_failslab+0x121/0x190 [ 684.500137] should_failslab+0x9/0x14 [ 684.503957] kmem_cache_alloc+0x47/0x700 19:46:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 684.508047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.513607] ? check_preemption_disabled+0x48/0x290 [ 684.518649] ? lock_acquire+0x16f/0x3f0 [ 684.522645] skb_clone+0x156/0x3e0 [ 684.526209] netlink_deliver_tap+0x97b/0xc20 [ 684.530639] netlink_unicast+0x5a8/0x720 [ 684.534722] ? netlink_attachskb+0x770/0x770 [ 684.539279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.544833] netlink_sendmsg+0x8ae/0xd70 [ 684.548920] ? netlink_unicast+0x720/0x720 [ 684.553188] ? selinux_socket_sendmsg+0x36/0x40 [ 684.557880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.563440] ? security_socket_sendmsg+0x8d/0xc0 [ 684.568214] ? netlink_unicast+0x720/0x720 [ 684.572467] sock_sendmsg+0xd7/0x130 [ 684.576382] ___sys_sendmsg+0x3e2/0x920 [ 684.580383] ? copy_msghdr_from_user+0x430/0x430 [ 684.585162] ? lock_downgrade+0x880/0x880 [ 684.589334] ? kasan_check_read+0x11/0x20 [ 684.593518] ? __fget+0x367/0x540 [ 684.596994] ? iterate_fd+0x360/0x360 [ 684.597016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 19:46:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4}]) [ 684.597030] ? proc_fail_nth_write+0x9d/0x1e0 [ 684.597048] ? __fget_light+0x1a9/0x230 [ 684.606377] ? __fdget+0x1b/0x20 [ 684.606394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.606409] ? sockfd_lookup_light+0xcb/0x180 [ 684.606429] __sys_sendmmsg+0x1bf/0x4e0 [ 684.632407] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 684.636754] ? kasan_check_write+0x14/0x20 [ 684.641029] ? __sb_end_write+0xd9/0x110 [ 684.645127] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 684.650693] ? fput+0x128/0x1a0 [ 684.653995] ? ksys_write+0x1f1/0x2d0 [ 684.657827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 684.662600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 684.667374] ? do_syscall_64+0x26/0x620 [ 684.671367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.676746] ? do_syscall_64+0x26/0x620 [ 684.680744] __x64_sys_sendmmsg+0x9d/0x100 [ 684.684997] do_syscall_64+0xfd/0x620 [ 684.688825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.694029] RIP: 0033:0x459a29 19:46:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xfffffff6, 0x0) 19:46:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 684.697238] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.716155] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 684.723893] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 684.731194] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 684.738514] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 684.745822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 684.753113] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x8000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f003ac182dcb9788cec0e6b00000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009817272f36af412d71861f2ec8b79e6a93cf97ae999f638eaab801"]}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 684.841364] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 684.882137] loop4: partition table partially beyond EOD, truncated [ 684.936657] loop4: p1 start 1 is beyond EOD, truncated [ 684.949739] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 684.974431] loop4: p3 size 2 extends beyond EOD, truncated [ 684.982823] loop4: p4 size 32768 extends beyond EOD, truncated [ 684.997215] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 685.028722] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:13 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500200001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:13 executing program 0 (fault-call:9 fault-nth:3): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7}]) 19:46:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1000000000000, 0x0) 19:46:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r0, 0x1, [], r2, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000240)={[{0x9, 0x8000, 0xd9, 0xa5, 0x5, 0x2, 0x1, 0x7f, 0x81, 0x6, 0x6, 0x1, 0x83d}, {0x1, 0x2, 0x5, 0x4, 0x3, 0x9, 0x7f, 0x7f, 0x20, 0x5, 0x6, 0x6, 0x4}, {0xfffffffc, 0x1ff, 0x1, 0x7, 0x9, 0x67, 0x20, 0x20, 0x1f, 0xd3, 0x1, 0x71, 0xfffffffffffffffc}], 0x4}) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r3, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000300)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r5 = socket$inet6(0xa, 0x80001, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@quiet='quiet'}]}) write$P9_RSTATu(r4, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0xe8, 0x80000) 19:46:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x6b6b6b00000000, 0x0) [ 685.462138] FAULT_INJECTION: forcing a failure. [ 685.462138] name failslab, interval 1, probability 0, space 0, times 0 [ 685.480833] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 685.495421] loop4: partition table partially beyond EOD, truncated [ 685.531340] loop4: p1 start 1 is beyond EOD, truncated 19:46:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa}]) [ 685.555570] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 685.593843] loop4: p3 size 2 extends beyond EOD, truncated [ 685.599973] CPU: 0 PID: 11570 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 685.599984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.599989] Call Trace: [ 685.600013] dump_stack+0x172/0x1f0 [ 685.600036] should_fail.cold+0xa/0x1b [ 685.600053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.600073] ? lock_downgrade+0x880/0x880 [ 685.600101] __should_failslab+0x121/0x190 [ 685.600118] should_failslab+0x9/0x14 [ 685.600131] kmem_cache_alloc_trace+0x2cc/0x760 [ 685.600146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.600166] ? security_capable+0x92/0xc0 [ 685.622889] tcf_chain_create+0x51/0x2c0 [ 685.622943] ? sfb_tcf_block+0x52/0x80 [ 685.636073] __tcf_chain_get+0x1e0/0x260 [ 685.636094] tc_new_tfilter+0x414/0x1790 [ 685.636175] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 685.636199] ? tc_del_tfilter+0xe60/0xe60 [ 685.636216] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 685.636229] ? kfree_skbmem+0xcb/0x150 [ 685.636247] ? mutex_trylock+0x1e0/0x1e0 [ 685.648959] ? find_held_lock+0x35/0x130 [ 685.648996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 19:46:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) [ 685.649014] ? tc_del_tfilter+0xe60/0xe60 [ 685.649031] rtnetlink_rcv_msg+0x463/0xb00 [ 685.649050] ? rtnetlink_put_metrics+0x560/0x560 [ 685.649070] ? netdev_pick_tx+0x300/0x300 [ 685.722573] ? netlink_deliver_tap+0x22d/0xc20 [ 685.727182] ? find_held_lock+0x35/0x130 [ 685.731256] netlink_rcv_skb+0x17d/0x460 [ 685.731276] ? rtnetlink_put_metrics+0x560/0x560 [ 685.731297] ? netlink_ack+0xb30/0xb30 [ 685.744000] ? kasan_check_read+0x11/0x20 [ 685.748161] ? netlink_deliver_tap+0x254/0xc20 [ 685.748184] rtnetlink_rcv+0x1d/0x30 19:46:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x100000000000000, 0x0) [ 685.748198] netlink_unicast+0x537/0x720 [ 685.748218] ? netlink_attachskb+0x770/0x770 [ 685.748240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.748259] netlink_sendmsg+0x8ae/0xd70 [ 685.748281] ? netlink_unicast+0x720/0x720 [ 685.748310] ? selinux_socket_sendmsg+0x36/0x40 [ 685.748325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.748339] ? security_socket_sendmsg+0x8d/0xc0 [ 685.748354] ? netlink_unicast+0x720/0x720 [ 685.774702] sock_sendmsg+0xd7/0x130 [ 685.789150] ___sys_sendmsg+0x3e2/0x920 [ 685.789170] ? copy_msghdr_from_user+0x430/0x430 [ 685.789194] ? lock_downgrade+0x880/0x880 [ 685.789214] ? kasan_check_read+0x11/0x20 [ 685.789234] ? __fget+0x367/0x540 [ 685.789255] ? iterate_fd+0x360/0x360 [ 685.789275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.789294] ? proc_fail_nth_write+0x9d/0x1e0 [ 685.789313] ? __fget_light+0x1a9/0x230 [ 685.789328] ? __fdget+0x1b/0x20 [ 685.789344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 685.802060] ? sockfd_lookup_light+0xcb/0x180 19:46:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 685.802077] __sys_sendmmsg+0x1bf/0x4e0 [ 685.802098] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 685.802119] ? kasan_check_write+0x14/0x20 [ 685.802148] ? __sb_end_write+0xd9/0x110 [ 685.802169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.802183] ? fput+0x128/0x1a0 [ 685.802199] ? ksys_write+0x1f1/0x2d0 [ 685.802221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.802236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.802250] ? do_syscall_64+0x26/0x620 [ 685.802268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.810986] ? do_syscall_64+0x26/0x620 [ 685.811010] __x64_sys_sendmmsg+0x9d/0x100 [ 685.811028] do_syscall_64+0xfd/0x620 [ 685.811049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.811059] RIP: 0033:0x459a29 [ 685.811073] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.811081] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 685.811098] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 685.811107] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 685.811115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 685.811124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 685.811133] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 685.820193] loop4: p4 size 32768 extends beyond EOD, truncated [ 686.021074] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 686.113163] loop4: p6 size 32768 extends beyond EOD, truncated [ 686.291587] print_req_error: 169 callbacks suppressed [ 686.291596] print_req_error: I/O error, dev loop4, sector 0 [ 686.291855] print_req_error: I/O error, dev loop4, sector 0 [ 686.297043] print_req_error: I/O error, dev loop4, sector 0 [ 686.297057] buffer_io_error: 150 callbacks suppressed [ 686.297066] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 686.297893] print_req_error: I/O error, dev loop4, sector 0 [ 686.303656] print_req_error: I/O error, dev loop4, sector 0 19:46:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000000000000, 0x0) 19:46:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2c}]) 19:46:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = semget$private(0x0, 0x0, 0x400) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000000)=""/200) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000240)=""/100) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000000000200"/92]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:14 executing program 0 (fault-call:9 fault-nth:4): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:14 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500230001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 686.313882] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 686.321583] print_req_error: I/O error, dev loop4, sector 0 [ 686.337404] print_req_error: I/O error, dev loop4, sector 0 [ 686.351504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 686.364548] print_req_error: I/O error, dev loop4, sector 0 [ 686.364564] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 686.364616] print_req_error: I/O error, dev loop4, sector 0 [ 686.364629] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 686.364670] print_req_error: I/O error, dev loop4, sector 0 [ 686.364682] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 686.364744] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 686.411882] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 686.419264] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 686.426689] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 686.434119] Buffer I/O error on dev loop4p3, logical block 0, async page read 19:46:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000000000000, 0x0) [ 686.584654] FAULT_INJECTION: forcing a failure. [ 686.584654] name failslab, interval 1, probability 0, space 0, times 0 [ 686.626201] CPU: 0 PID: 11825 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 686.633195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.642568] Call Trace: [ 686.645185] dump_stack+0x172/0x1f0 [ 686.648845] should_fail.cold+0xa/0x1b [ 686.652770] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.657897] ? lock_downgrade+0x880/0x880 [ 686.662078] __should_failslab+0x121/0x190 [ 686.666366] should_failslab+0x9/0x14 [ 686.670182] kmem_cache_alloc_node+0x26c/0x710 19:46:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1000000000000000, 0x0) [ 686.674783] ? __lock_is_held+0xb6/0x140 [ 686.678869] __alloc_skb+0xd5/0x5f0 [ 686.682513] ? skb_scrub_packet+0x490/0x490 [ 686.686846] ? kmem_cache_alloc_trace+0x348/0x760 [ 686.691711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.697283] ? security_capable+0x92/0xc0 [ 686.701462] tc_chain_notify+0xcf/0x200 [ 686.705459] __tcf_chain_get+0x210/0x260 [ 686.709547] tc_new_tfilter+0x414/0x1790 [ 686.713631] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 686.718064] ? tc_del_tfilter+0xe60/0xe60 [ 686.722238] ? rtnetlink_rcv_msg+0x40a/0xb00 19:46:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xf6ffffff00000000, 0x0) [ 686.726928] ? kfree_skbmem+0xcb/0x150 [ 686.730858] ? mutex_trylock+0x1e0/0x1e0 [ 686.734937] ? find_held_lock+0x35/0x130 [ 686.739039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.744609] ? tc_del_tfilter+0xe60/0xe60 [ 686.748794] rtnetlink_rcv_msg+0x463/0xb00 [ 686.753046] ? rtnetlink_put_metrics+0x560/0x560 [ 686.757823] ? netdev_pick_tx+0x300/0x300 [ 686.761993] ? netlink_deliver_tap+0x22d/0xc20 [ 686.766595] ? find_held_lock+0x35/0x130 [ 686.770679] netlink_rcv_skb+0x17d/0x460 19:46:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 686.774760] ? rtnetlink_put_metrics+0x560/0x560 [ 686.779537] ? netlink_ack+0xb30/0xb30 [ 686.783442] ? kasan_check_read+0x11/0x20 [ 686.787620] ? netlink_deliver_tap+0x254/0xc20 [ 686.792224] rtnetlink_rcv+0x1d/0x30 [ 686.796014] netlink_unicast+0x537/0x720 [ 686.800077] ? netlink_attachskb+0x770/0x770 [ 686.804479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.810179] netlink_sendmsg+0x8ae/0xd70 [ 686.814239] ? netlink_unicast+0x720/0x720 [ 686.818478] ? selinux_socket_sendmsg+0x36/0x40 [ 686.823151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.828697] ? security_socket_sendmsg+0x8d/0xc0 [ 686.833457] ? netlink_unicast+0x720/0x720 [ 686.837708] sock_sendmsg+0xd7/0x130 [ 686.841431] ___sys_sendmsg+0x3e2/0x920 [ 686.845411] ? copy_msghdr_from_user+0x430/0x430 [ 686.850170] ? lock_downgrade+0x880/0x880 [ 686.854320] ? kasan_check_read+0x11/0x20 [ 686.858485] ? __fget+0x367/0x540 [ 686.861949] ? iterate_fd+0x360/0x360 [ 686.865760] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 686.871299] ? proc_fail_nth_write+0x9d/0x1e0 [ 686.875804] ? __fget_light+0x1a9/0x230 [ 686.879775] ? __fdget+0x1b/0x20 [ 686.883152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.888704] ? sockfd_lookup_light+0xcb/0x180 [ 686.893223] __sys_sendmmsg+0x1bf/0x4e0 [ 686.897194] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 686.901506] ? kasan_check_write+0x14/0x20 [ 686.905814] ? __sb_end_write+0xd9/0x110 [ 686.909876] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 686.915414] ? fput+0x128/0x1a0 [ 686.918699] ? ksys_write+0x1f1/0x2d0 [ 686.922502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 686.927249] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 686.932005] ? do_syscall_64+0x26/0x620 [ 686.935981] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.941340] ? do_syscall_64+0x26/0x620 [ 686.945315] __x64_sys_sendmmsg+0x9d/0x100 [ 686.949563] do_syscall_64+0xfd/0x620 [ 686.953363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.958537] RIP: 0033:0x459a29 19:46:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x33}]) 19:46:15 executing program 0 (fault-call:9 fault-nth:5): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 686.961715] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.980605] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 686.988303] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 686.995563] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 687.002819] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 687.010079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 687.017347] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 687.091822] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 687.109948] loop4: partition table partially beyond EOD, truncated [ 687.165129] loop4: p1 start 1 is beyond EOD, truncated 19:46:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 687.210933] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 687.227761] loop4: p3 size 2 extends beyond EOD, truncated [ 687.245193] FAULT_INJECTION: forcing a failure. [ 687.245193] name failslab, interval 1, probability 0, space 0, times 0 19:46:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x2) [ 687.258245] loop4: p4 size 32768 extends beyond EOD, truncated [ 687.266716] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 687.274134] CPU: 1 PID: 11955 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 687.281086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.290455] Call Trace: [ 687.293064] dump_stack+0x172/0x1f0 [ 687.293087] should_fail.cold+0xa/0x1b [ 687.293108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 687.305720] ? lock_downgrade+0x880/0x880 [ 687.305747] __should_failslab+0x121/0x190 [ 687.305765] should_failslab+0x9/0x14 [ 687.317948] kmem_cache_alloc_node_trace+0x274/0x720 [ 687.323072] ? __alloc_skb+0xd5/0x5f0 [ 687.326902] __kmalloc_node_track_caller+0x3d/0x80 [ 687.331854] __kmalloc_reserve.isra.0+0x40/0xf0 [ 687.336547] __alloc_skb+0x10b/0x5f0 [ 687.340280] ? skb_scrub_packet+0x490/0x490 [ 687.344624] ? kmem_cache_alloc_trace+0x348/0x760 [ 687.349489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.355053] ? security_capable+0x92/0xc0 [ 687.359230] tc_chain_notify+0xcf/0x200 [ 687.363228] __tcf_chain_get+0x210/0x260 [ 687.367328] tc_new_tfilter+0x414/0x1790 [ 687.371412] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 687.375847] ? tc_del_tfilter+0xe60/0xe60 [ 687.380019] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 687.384432] ? kfree_skbmem+0xcb/0x150 [ 687.384454] ? mutex_trylock+0x1e0/0x1e0 [ 687.384470] ? find_held_lock+0x35/0x130 [ 687.384499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.402019] ? tc_del_tfilter+0xe60/0xe60 [ 687.406186] rtnetlink_rcv_msg+0x463/0xb00 [ 687.410446] ? rtnetlink_put_metrics+0x560/0x560 [ 687.410465] ? netdev_pick_tx+0x300/0x300 [ 687.410481] ? netlink_deliver_tap+0x22d/0xc20 [ 687.410499] ? find_held_lock+0x35/0x130 [ 687.410515] netlink_rcv_skb+0x17d/0x460 [ 687.410529] ? rtnetlink_put_metrics+0x560/0x560 [ 687.410544] ? netlink_ack+0xb30/0xb30 [ 687.410559] ? kasan_check_read+0x11/0x20 [ 687.410578] ? netlink_deliver_tap+0x254/0xc20 [ 687.424049] rtnetlink_rcv+0x1d/0x30 [ 687.424064] netlink_unicast+0x537/0x720 [ 687.424082] ? netlink_attachskb+0x770/0x770 [ 687.437114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.437134] netlink_sendmsg+0x8ae/0xd70 [ 687.437152] ? netlink_unicast+0x720/0x720 [ 687.449772] ? selinux_socket_sendmsg+0x36/0x40 [ 687.449788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.449802] ? security_socket_sendmsg+0x8d/0xc0 [ 687.449816] ? netlink_unicast+0x720/0x720 [ 687.449833] sock_sendmsg+0xd7/0x130 [ 687.449850] ___sys_sendmsg+0x3e2/0x920 [ 687.449866] ? copy_msghdr_from_user+0x430/0x430 [ 687.449884] ? lock_downgrade+0x880/0x880 [ 687.449903] ? kasan_check_read+0x11/0x20 [ 687.449928] ? __fget+0x367/0x540 [ 687.462103] ? iterate_fd+0x360/0x360 [ 687.462123] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 687.462136] ? proc_fail_nth_write+0x9d/0x1e0 [ 687.462152] ? __fget_light+0x1a9/0x230 [ 687.462166] ? __fdget+0x1b/0x20 [ 687.462180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.462194] ? sockfd_lookup_light+0xcb/0x180 [ 687.462210] __sys_sendmmsg+0x1bf/0x4e0 [ 687.462230] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 687.462251] ? kasan_check_write+0x14/0x20 [ 687.476583] loop4: p6 size 32768 extends beyond EOD, [ 687.480741] ? __sb_end_write+0xd9/0x110 [ 687.480763] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 687.480775] ? fput+0x128/0x1a0 [ 687.480790] ? ksys_write+0x1f1/0x2d0 [ 687.480808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.480821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 687.480834] ? do_syscall_64+0x26/0x620 [ 687.480851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.494905] truncated [ 687.495357] ? do_syscall_64+0x26/0x620 19:46:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x4) [ 687.503050] __x64_sys_sendmmsg+0x9d/0x100 [ 687.519515] do_syscall_64+0xfd/0x620 [ 687.519537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.519555] RIP: 0033:0x459a29 [ 687.528896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.546218] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 687.546237] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 687.546246] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 687.546256] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 687.546264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 687.546275] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:16 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105033c0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000000c0)={'hwsim0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x7fffffa7) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1000) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000000240)=""/247) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x10) 19:46:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3b}]) 19:46:16 executing program 0 (fault-call:9 fault-nth:6): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x6b6b6b) [ 688.026567] FAULT_INJECTION: forcing a failure. [ 688.026567] name failslab, interval 1, probability 0, space 0, times 0 [ 688.091791] CPU: 1 PID: 12083 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 688.098779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.108141] Call Trace: [ 688.110748] dump_stack+0x172/0x1f0 [ 688.114403] should_fail.cold+0xa/0x1b [ 688.118315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 688.123443] ? save_stack+0x45/0xd0 [ 688.127084] ? kasan_kmalloc+0xce/0xf0 [ 688.130982] ? __kmalloc_node_track_caller+0x51/0x80 [ 688.136097] ? __kmalloc_reserve.isra.0+0x40/0xf0 [ 688.140953] ? __alloc_skb+0x10b/0x5f0 [ 688.144860] ? tc_chain_notify+0xcf/0x200 [ 688.149030] __should_failslab+0x121/0x190 [ 688.153278] should_failslab+0x9/0x14 [ 688.157118] kmem_cache_alloc_node_trace+0x5a/0x720 [ 688.162151] ? __lock_is_held+0xb6/0x140 [ 688.166215] ? should_fail+0x14d/0x85c [ 688.170116] __kmalloc_node_track_caller+0x3d/0x80 [ 688.175063] __kmalloc_reserve.isra.0+0x40/0xf0 [ 688.179751] pskb_expand_head+0x154/0xe20 [ 688.183912] ? skb_put+0x183/0x1e0 [ 688.187471] ? memset+0x32/0x40 [ 688.190768] ? memcpy+0x46/0x50 [ 688.194063] netlink_trim+0x215/0x260 [ 688.197875] netlink_broadcast_filtered+0x64/0xb20 [ 688.202817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.208380] netlink_broadcast+0x3a/0x50 [ 688.212517] rtnetlink_send+0xa1/0x110 [ 688.216426] tc_chain_notify+0x151/0x200 [ 688.220507] __tcf_chain_get+0x210/0x260 [ 688.224585] tc_new_tfilter+0x414/0x1790 [ 688.228690] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 688.233125] ? tc_del_tfilter+0xe60/0xe60 [ 688.237294] ? rtnetlink_rcv_msg+0x40a/0xb00 19:46:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 688.241713] ? kfree_skbmem+0xcb/0x150 [ 688.245622] ? mutex_trylock+0x1e0/0x1e0 [ 688.249701] ? find_held_lock+0x35/0x130 [ 688.253802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.259352] ? tc_del_tfilter+0xe60/0xe60 [ 688.263515] rtnetlink_rcv_msg+0x463/0xb00 [ 688.267776] ? rtnetlink_put_metrics+0x560/0x560 [ 688.272558] ? netdev_pick_tx+0x300/0x300 [ 688.276724] ? netlink_deliver_tap+0x22d/0xc20 [ 688.281326] ? find_held_lock+0x35/0x130 [ 688.285397] netlink_rcv_skb+0x17d/0x460 [ 688.285414] ? rtnetlink_put_metrics+0x560/0x560 [ 688.285429] ? netlink_ack+0xb30/0xb30 [ 688.298127] ? kasan_check_read+0x11/0x20 [ 688.302291] ? netlink_deliver_tap+0x254/0xc20 [ 688.302311] rtnetlink_rcv+0x1d/0x30 [ 688.302324] netlink_unicast+0x537/0x720 [ 688.302341] ? netlink_attachskb+0x770/0x770 [ 688.302361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.302380] netlink_sendmsg+0x8ae/0xd70 [ 688.328704] ? netlink_unicast+0x720/0x720 [ 688.332969] ? selinux_socket_sendmsg+0x36/0x40 19:46:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x1000000) [ 688.337664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.343256] ? security_socket_sendmsg+0x8d/0xc0 [ 688.348032] ? netlink_unicast+0x720/0x720 [ 688.352291] sock_sendmsg+0xd7/0x130 [ 688.356031] ___sys_sendmsg+0x3e2/0x920 [ 688.360029] ? copy_msghdr_from_user+0x430/0x430 [ 688.364815] ? lock_downgrade+0x880/0x880 [ 688.368985] ? kasan_check_read+0x11/0x20 [ 688.373150] ? __fget+0x367/0x540 [ 688.376626] ? iterate_fd+0x360/0x360 [ 688.380447] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 688.385992] ? proc_fail_nth_write+0x9d/0x1e0 19:46:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 688.390507] ? __fget_light+0x1a9/0x230 [ 688.394501] ? __fdget+0x1b/0x20 [ 688.398845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.404405] ? sockfd_lookup_light+0xcb/0x180 [ 688.408930] __sys_sendmmsg+0x1bf/0x4e0 [ 688.412931] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 688.417275] ? kasan_check_write+0x14/0x20 [ 688.421557] ? __sb_end_write+0xd9/0x110 [ 688.425641] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 688.431202] ? fput+0x128/0x1a0 [ 688.434504] ? ksys_write+0x1f1/0x2d0 [ 688.438317] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.443076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.447848] ? do_syscall_64+0x26/0x620 [ 688.451824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.457188] ? do_syscall_64+0x26/0x620 [ 688.461194] __x64_sys_sendmmsg+0x9d/0x100 [ 688.465506] do_syscall_64+0xfd/0x620 [ 688.469312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.474576] RIP: 0033:0x459a29 [ 688.477770] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.496686] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 688.504392] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 688.511659] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 688.518928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 688.526196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 688.533457] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 688.618417] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 688.645246] loop4: partition table partially beyond EOD, truncated [ 688.670198] loop4: p1 start 1 is beyond EOD, truncated [ 688.720026] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 688.735393] loop4: p3 size 2 extends beyond EOD, truncated [ 688.746633] loop4: p4 size 32768 extends beyond EOD, truncated [ 688.773255] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 688.787668] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:17 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105003f0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3c}]) 19:46:17 executing program 0 (fault-call:9 fault-nth:7): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x2000000) 19:46:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x3d, &(0x7f0000000100)={0x0, 0x2}) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x78) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14, r6, 0x19, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40201004}, 0xc, &(0x7f0000000240)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c01000063799713b8fe7b0d0f9b7a44204c1ee04a8e27c7844bdcdc90090000001657b08bd4f6cf6878390032ef3a8fdcb9658609e5aa7c4e067ee8154c160289", @ANYRES16=r6, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x40}, 0x10) 19:46:17 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:17 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x4000000) [ 689.057175] FAULT_INJECTION: forcing a failure. [ 689.057175] name failslab, interval 1, probability 0, space 0, times 0 [ 689.127524] CPU: 0 PID: 12239 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 689.134514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.143890] Call Trace: [ 689.146505] dump_stack+0x172/0x1f0 [ 689.150152] should_fail.cold+0xa/0x1b [ 689.154064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 689.159185] ? save_stack+0x45/0xd0 [ 689.162823] ? kasan_kmalloc+0xce/0xf0 [ 689.166722] ? __kmalloc_node_track_caller+0x51/0x80 [ 689.171839] ? __kmalloc_reserve.isra.0+0x40/0xf0 19:46:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='ppp1procvmnet1\xdd)wlan0+]', 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r2}, 0x10) 19:46:17 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 689.176691] ? __alloc_skb+0x10b/0x5f0 [ 689.180591] ? tc_chain_notify+0xcf/0x200 [ 689.184760] __should_failslab+0x121/0x190 [ 689.189012] should_failslab+0x9/0x14 [ 689.192841] kmem_cache_alloc_node_trace+0x5a/0x720 [ 689.197892] __kmalloc_node_track_caller+0x3d/0x80 [ 689.202867] __kmalloc_reserve.isra.0+0x40/0xf0 [ 689.207564] pskb_expand_head+0x154/0xe20 [ 689.211724] ? skb_put+0x183/0x1e0 [ 689.215274] ? memset+0x32/0x40 [ 689.218569] ? memcpy+0x46/0x50 [ 689.221860] netlink_trim+0x215/0x260 19:46:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x10000000) [ 689.225680] netlink_broadcast_filtered+0x64/0xb20 [ 689.230628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.236183] netlink_broadcast+0x3a/0x50 [ 689.240259] rtnetlink_send+0xa1/0x110 [ 689.244168] tc_chain_notify+0x151/0x200 [ 689.248258] __tcf_chain_get+0x210/0x260 [ 689.252335] tc_new_tfilter+0x414/0x1790 [ 689.252352] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 689.252376] ? tc_del_tfilter+0xe60/0xe60 [ 689.252389] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 689.252402] ? kfree_skbmem+0xcb/0x150 [ 689.252422] ? mutex_trylock+0x1e0/0x1e0 [ 689.252442] ? find_held_lock+0x35/0x130 [ 689.252478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.252494] ? tc_del_tfilter+0xe60/0xe60 [ 689.252508] rtnetlink_rcv_msg+0x463/0xb00 [ 689.252525] ? rtnetlink_put_metrics+0x560/0x560 [ 689.252541] ? netdev_pick_tx+0x300/0x300 [ 689.252559] ? netlink_deliver_tap+0x22d/0xc20 [ 689.261017] ? find_held_lock+0x35/0x130 [ 689.261042] netlink_rcv_skb+0x17d/0x460 [ 689.261058] ? rtnetlink_put_metrics+0x560/0x560 [ 689.261075] ? netlink_ack+0xb30/0xb30 [ 689.261092] ? kasan_check_read+0x11/0x20 [ 689.261114] ? netlink_deliver_tap+0x254/0xc20 [ 689.261135] rtnetlink_rcv+0x1d/0x30 [ 689.261148] netlink_unicast+0x537/0x720 [ 689.261166] ? netlink_attachskb+0x770/0x770 [ 689.261185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.261204] netlink_sendmsg+0x8ae/0xd70 [ 689.261225] ? netlink_unicast+0x720/0x720 [ 689.261248] ? selinux_socket_sendmsg+0x36/0x40 [ 689.261267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.291454] ? security_socket_sendmsg+0x8d/0xc0 19:46:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x6b6b6b00) [ 689.291472] ? netlink_unicast+0x720/0x720 [ 689.291490] sock_sendmsg+0xd7/0x130 [ 689.300463] ___sys_sendmsg+0x3e2/0x920 [ 689.300482] ? copy_msghdr_from_user+0x430/0x430 [ 689.300504] ? lock_downgrade+0x880/0x880 [ 689.300524] ? kasan_check_read+0x11/0x20 [ 689.300543] ? __fget+0x367/0x540 [ 689.300563] ? iterate_fd+0x360/0x360 [ 689.300582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 689.300597] ? proc_fail_nth_write+0x9d/0x1e0 [ 689.300614] ? __fget_light+0x1a9/0x230 [ 689.300627] ? __fdget+0x1b/0x20 [ 689.300642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.300655] ? sockfd_lookup_light+0xcb/0x180 [ 689.300674] __sys_sendmmsg+0x1bf/0x4e0 [ 689.300693] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 689.443785] ? kasan_check_write+0x14/0x20 [ 689.448054] ? __sb_end_write+0xd9/0x110 [ 689.452140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 689.457699] ? fput+0x128/0x1a0 [ 689.461001] ? ksys_write+0x1f1/0x2d0 [ 689.464847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 689.469624] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 689.474400] ? do_syscall_64+0x26/0x620 [ 689.478397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.483780] ? do_syscall_64+0x26/0x620 [ 689.487780] __x64_sys_sendmmsg+0x9d/0x100 [ 689.492043] do_syscall_64+0xfd/0x620 [ 689.495856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.501056] RIP: 0033:0x459a29 [ 689.504263] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.523183] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 689.530921] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 689.538225] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 689.545510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 689.552797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 689.560087] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 689.604851] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 689.630507] loop4: partition table partially beyond EOD, truncated [ 689.646935] loop4: p1 start 1 is beyond EOD, truncated [ 689.698971] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 689.730688] loop4: p3 size 2 extends beyond EOD, truncated [ 689.738290] loop4: p4 size 32768 extends beyond EOD, truncated [ 689.748339] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 689.774065] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:18 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500400001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x60}]) 19:46:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0xf6ffffff) 19:46:18 executing program 0 (fault-call:9 fault-nth:8): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x1, 0x66, 0x3, 0x2, 0x0, 0x401, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}, 0x8108, 0xff, 0x7, 0x3, 0x3, 0xff, 0x6}, r1, 0x2, r2, 0xa) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0xfffffff6) [ 690.080040] FAULT_INJECTION: forcing a failure. [ 690.080040] name failslab, interval 1, probability 0, space 0, times 0 [ 690.105647] CPU: 1 PID: 12500 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 690.112641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.122022] Call Trace: [ 690.124640] dump_stack+0x172/0x1f0 19:46:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 690.128294] should_fail.cold+0xa/0x1b [ 690.132205] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 690.137327] ? lock_downgrade+0x880/0x880 [ 690.141511] __should_failslab+0x121/0x190 [ 690.145778] should_failslab+0x9/0x14 [ 690.149605] kmem_cache_alloc_trace+0x2cc/0x760 [ 690.154300] ? lockdep_rtnl_is_held+0x26/0x30 [ 690.158819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.164376] tc_new_tfilter+0x93c/0x1790 [ 690.164402] ? tc_del_tfilter+0xe60/0xe60 [ 690.164419] ? rtnetlink_rcv_msg+0x40a/0xb00 19:46:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 690.172614] ? kfree_skbmem+0xcb/0x150 [ 690.172630] ? mutex_trylock+0x1e0/0x1e0 [ 690.172664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.172680] ? tc_del_tfilter+0xe60/0xe60 [ 690.172695] rtnetlink_rcv_msg+0x463/0xb00 [ 690.172712] ? rtnetlink_put_metrics+0x560/0x560 [ 690.172739] ? netdev_pick_tx+0x300/0x300 [ 690.207918] ? netlink_deliver_tap+0x22d/0xc20 [ 690.212528] ? find_held_lock+0x35/0x130 [ 690.216625] netlink_rcv_skb+0x17d/0x460 [ 690.220726] ? rtnetlink_put_metrics+0x560/0x560 [ 690.225518] ? netlink_ack+0xb30/0xb30 19:46:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x8a829) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x0, 0x0, &(0x7f0000002100)) r4 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f00000000c0)={0x7fffffff, 0xeb, 0x7, 0xca6e}, 0x10) fchdir(r3) r5 = accept$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000340)={'yam0\x00', 0xb}) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$NBD_CLEAR_QUE(r6, 0xab05) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x1000000000000) [ 690.229429] ? kasan_check_read+0x11/0x20 [ 690.233611] ? netlink_deliver_tap+0x254/0xc20 [ 690.238315] rtnetlink_rcv+0x1d/0x30 [ 690.242052] netlink_unicast+0x537/0x720 [ 690.246143] ? netlink_attachskb+0x770/0x770 [ 690.250584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.256154] netlink_sendmsg+0x8ae/0xd70 [ 690.260249] ? netlink_unicast+0x720/0x720 [ 690.264514] ? selinux_socket_sendmsg+0x36/0x40 [ 690.269200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.274760] ? security_socket_sendmsg+0x8d/0xc0 [ 690.279542] ? netlink_unicast+0x720/0x720 [ 690.283794] sock_sendmsg+0xd7/0x130 [ 690.287508] ___sys_sendmsg+0x3e2/0x920 [ 690.291488] ? copy_msghdr_from_user+0x430/0x430 [ 690.296238] ? lock_downgrade+0x880/0x880 [ 690.300378] ? kasan_check_read+0x11/0x20 [ 690.304519] ? __fget+0x367/0x540 [ 690.307960] ? iterate_fd+0x360/0x360 [ 690.311751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 690.317297] ? proc_fail_nth_write+0x9d/0x1e0 [ 690.321788] ? __fget_light+0x1a9/0x230 [ 690.325770] ? __fdget+0x1b/0x20 [ 690.329126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.334737] ? sockfd_lookup_light+0xcb/0x180 [ 690.339259] __sys_sendmmsg+0x1bf/0x4e0 [ 690.343235] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 690.347552] ? kasan_check_write+0x14/0x20 [ 690.351790] ? __sb_end_write+0xd9/0x110 [ 690.355891] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 690.361426] ? fput+0x128/0x1a0 [ 690.364696] ? ksys_write+0x1f1/0x2d0 [ 690.368485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.373227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.377987] ? do_syscall_64+0x26/0x620 [ 690.381978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.387345] ? do_syscall_64+0x26/0x620 [ 690.391316] __x64_sys_sendmmsg+0x9d/0x100 [ 690.395559] do_syscall_64+0xfd/0x620 [ 690.399367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.404544] RIP: 0033:0x459a29 [ 690.407724] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.426620] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 690.434370] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 690.441709] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 690.449092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 690.456378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 690.463658] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 690.540176] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 690.547239] loop4: partition table partially beyond EOD, truncated [ 690.560185] loop4: p1 start 1 is beyond EOD, truncated [ 690.569691] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 690.594150] loop4: p3 size 2 extends beyond EOD, truncated [ 690.638722] loop4: p4 size 32768 extends beyond EOD, truncated [ 690.666152] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 690.685951] loop4: p6 size 32768 extends beyond EOD, truncated [ 690.755815] audit: type=1800 audit(1570045579.288:284): pid=12530 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17160 res=0 [ 690.806885] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 19:46:19 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500480001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:19 executing program 0 (fault-call:9 fault-nth:9): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xe0}]) 19:46:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x6b6b6b00000000) 19:46:19 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:19 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x100000000000000) [ 691.062333] FAULT_INJECTION: forcing a failure. [ 691.062333] name failslab, interval 1, probability 0, space 0, times 0 [ 691.110035] CPU: 0 PID: 12650 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 691.117027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.126402] Call Trace: [ 691.129027] dump_stack+0x172/0x1f0 [ 691.132688] should_fail.cold+0xa/0x1b [ 691.136614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 691.141735] ? lock_downgrade+0x880/0x880 [ 691.145889] __should_failslab+0x121/0x190 [ 691.150119] should_failslab+0x9/0x14 [ 691.153948] kmem_cache_alloc_trace+0x2cc/0x760 [ 691.158610] ? lock_downgrade+0x880/0x880 [ 691.162757] u32_init+0x516/0xd10 [ 691.166198] ? _raw_read_unlock+0x2d/0x50 [ 691.170346] tc_new_tfilter+0xaf1/0x1790 [ 691.174926] ? tc_del_tfilter+0xe60/0xe60 [ 691.179064] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 691.183462] ? kfree_skbmem+0xcb/0x150 [ 691.187354] ? mutex_trylock+0x1e0/0x1e0 [ 691.191418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.197012] ? tc_del_tfilter+0xe60/0xe60 [ 691.201209] rtnetlink_rcv_msg+0x463/0xb00 [ 691.205447] ? rtnetlink_put_metrics+0x560/0x560 [ 691.210203] ? netdev_pick_tx+0x300/0x300 [ 691.214356] ? netlink_deliver_tap+0x22d/0xc20 [ 691.218939] ? find_held_lock+0x35/0x130 [ 691.223003] netlink_rcv_skb+0x17d/0x460 [ 691.227073] ? rtnetlink_put_metrics+0x560/0x560 [ 691.231832] ? netlink_ack+0xb30/0xb30 [ 691.235711] ? kasan_check_read+0x11/0x20 [ 691.239852] ? netlink_deliver_tap+0x254/0xc20 [ 691.244426] rtnetlink_rcv+0x1d/0x30 [ 691.248130] netlink_unicast+0x537/0x720 [ 691.252200] ? netlink_attachskb+0x770/0x770 [ 691.256602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.262132] netlink_sendmsg+0x8ae/0xd70 [ 691.266185] ? netlink_unicast+0x720/0x720 [ 691.270414] ? selinux_socket_sendmsg+0x36/0x40 [ 691.275071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.280596] ? security_socket_sendmsg+0x8d/0xc0 [ 691.285340] ? netlink_unicast+0x720/0x720 [ 691.289570] sock_sendmsg+0xd7/0x130 [ 691.293275] ___sys_sendmsg+0x3e2/0x920 [ 691.297241] ? copy_msghdr_from_user+0x430/0x430 [ 691.302011] ? lock_downgrade+0x880/0x880 [ 691.306155] ? kasan_check_read+0x11/0x20 [ 691.310295] ? __fget+0x367/0x540 [ 691.313739] ? iterate_fd+0x360/0x360 [ 691.317530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 691.323069] ? proc_fail_nth_write+0x9d/0x1e0 [ 691.327557] ? __fget_light+0x1a9/0x230 [ 691.331522] ? __fdget+0x1b/0x20 [ 691.334877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.340410] ? sockfd_lookup_light+0xcb/0x180 [ 691.344913] __sys_sendmmsg+0x1bf/0x4e0 [ 691.348880] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 691.353201] ? kasan_check_write+0x14/0x20 [ 691.357435] ? __sb_end_write+0xd9/0x110 [ 691.361521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 691.367052] ? fput+0x128/0x1a0 [ 691.370324] ? ksys_write+0x1f1/0x2d0 [ 691.374129] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 691.378884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 691.383633] ? do_syscall_64+0x26/0x620 [ 691.387596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.392965] ? do_syscall_64+0x26/0x620 [ 691.396938] __x64_sys_sendmmsg+0x9d/0x100 [ 691.401164] do_syscall_64+0xfd/0x620 [ 691.404956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.410136] RIP: 0033:0x459a29 [ 691.413319] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.432226] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 691.440025] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 691.447485] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 19:46:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3d8}]) [ 691.454761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 691.462022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 691.469292] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 691.486500] print_req_error: 113 callbacks suppressed [ 691.486509] print_req_error: I/O error, dev loop4, sector 0 [ 691.496385] print_req_error: I/O error, dev loop4, sector 0 [ 691.499623] print_req_error: I/O error, dev loop4, sector 0 [ 691.510105] buffer_io_error: 101 callbacks suppressed [ 691.510116] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 691.522999] print_req_error: I/O error, dev loop4, sector 0 [ 691.529443] print_req_error: I/O error, dev loop4, sector 0 [ 691.535652] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 691.544303] print_req_error: I/O error, dev loop4, sector 0 [ 691.550369] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 691.558068] print_req_error: I/O error, dev loop4, sector 0 [ 691.564112] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 691.571779] print_req_error: I/O error, dev loop4, sector 0 [ 691.577734] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 691.585430] print_req_error: I/O error, dev loop4, sector 0 [ 691.591660] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 691.599362] print_req_error: I/O error, dev loop4, sector 0 [ 691.605609] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 691.613365] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 691.621844] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 691.629630] Buffer I/O error on dev loop4p5, logical block 0, async page read 19:46:20 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x200000000000000) 19:46:20 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 691.877698] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 691.926160] loop4: partition table partially beyond EOD, truncated [ 691.980840] loop4: p1 start 1 is beyond EOD, truncated [ 691.986423] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 692.030261] loop4: p3 size 2 extends beyond EOD, truncated [ 692.038041] loop4: p4 size 32768 extends beyond EOD, truncated 19:46:20 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105004c0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:20 executing program 0 (fault-call:9 fault-nth:10): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x576}]) 19:46:20 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000000c0)={0x0, 0xc907, 0x5, 0x3ff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x840, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000280)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x400000000000000) 19:46:20 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x5]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 692.073160] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 692.087144] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x1000000000000000) [ 692.240401] FAULT_INJECTION: forcing a failure. [ 692.240401] name failslab, interval 1, probability 0, space 0, times 0 [ 692.290279] CPU: 1 PID: 12796 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 692.297282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.306657] Call Trace: [ 692.309269] dump_stack+0x172/0x1f0 [ 692.312919] should_fail.cold+0xa/0x1b [ 692.316831] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 692.321958] ? lock_downgrade+0x880/0x880 [ 692.326141] __should_failslab+0x121/0x190 [ 692.330406] should_failslab+0x9/0x14 [ 692.334225] kmem_cache_alloc_trace+0x2cc/0x760 [ 692.338918] ? lockdep_rtnl_is_held+0x26/0x30 [ 692.343455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.349024] tc_new_tfilter+0x93c/0x1790 [ 692.353121] ? tc_del_tfilter+0xe60/0xe60 [ 692.357291] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 692.361721] ? kfree_skbmem+0xcb/0x150 [ 692.365628] ? mutex_trylock+0x1e0/0x1e0 [ 692.369728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.375287] ? tc_del_tfilter+0xe60/0xe60 [ 692.379455] rtnetlink_rcv_msg+0x463/0xb00 [ 692.383710] ? rtnetlink_put_metrics+0x560/0x560 [ 692.388490] ? netdev_pick_tx+0x300/0x300 [ 692.388512] ? netlink_deliver_tap+0x22d/0xc20 [ 692.388533] ? find_held_lock+0x35/0x130 [ 692.397269] netlink_rcv_skb+0x17d/0x460 [ 692.397287] ? rtnetlink_put_metrics+0x560/0x560 [ 692.397301] ? netlink_ack+0xb30/0xb30 [ 692.397319] ? kasan_check_read+0x11/0x20 [ 692.418221] ? netlink_deliver_tap+0x254/0xc20 [ 692.422835] rtnetlink_rcv+0x1d/0x30 [ 692.426568] netlink_unicast+0x537/0x720 [ 692.430653] ? netlink_attachskb+0x770/0x770 [ 692.435088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.440644] netlink_sendmsg+0x8ae/0xd70 [ 692.444735] ? netlink_unicast+0x720/0x720 [ 692.448987] ? selinux_socket_sendmsg+0x36/0x40 [ 692.453669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.459220] ? security_socket_sendmsg+0x8d/0xc0 [ 692.463990] ? netlink_unicast+0x720/0x720 [ 692.468245] sock_sendmsg+0xd7/0x130 [ 692.471989] ___sys_sendmsg+0x3e2/0x920 [ 692.475982] ? copy_msghdr_from_user+0x430/0x430 [ 692.480757] ? lock_downgrade+0x880/0x880 [ 692.484928] ? kasan_check_read+0x11/0x20 [ 692.489094] ? __fget+0x367/0x540 [ 692.492568] ? iterate_fd+0x360/0x360 [ 692.496376] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 692.501911] ? proc_fail_nth_write+0x9d/0x1e0 [ 692.501932] ? __fget_light+0x1a9/0x230 [ 692.501947] ? __fdget+0x1b/0x20 [ 692.501962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.501974] ? sockfd_lookup_light+0xcb/0x180 [ 692.501990] __sys_sendmmsg+0x1bf/0x4e0 [ 692.502008] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 692.502024] ? kasan_check_write+0x14/0x20 [ 692.502049] ? __sb_end_write+0xd9/0x110 [ 692.502064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 692.502079] ? fput+0x128/0x1a0 [ 692.549286] ? ksys_write+0x1f1/0x2d0 [ 692.553117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 692.557891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 692.562658] ? do_syscall_64+0x26/0x620 [ 692.566647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.572131] ? do_syscall_64+0x26/0x620 [ 692.576128] __x64_sys_sendmmsg+0x9d/0x100 [ 692.580390] do_syscall_64+0xfd/0x620 [ 692.584218] entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:46:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0xf6ffffff00000000) 19:46:21 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x578}]) 19:46:21 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x7]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 692.589424] RIP: 0033:0x459a29 [ 692.592632] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.611551] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 692.619292] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 692.626594] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 692.633884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.641172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 692.648459] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:21 executing program 0 (fault-call:9 fault-nth:11): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 692.729221] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 692.741592] loop4: partition table partially beyond EOD, truncated [ 692.771730] loop4: p1 start 1 is beyond EOD, truncated [ 692.797785] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 692.812079] loop4: p3 size 2 extends beyond EOD, truncated [ 692.842046] loop4: p4 size 32768 extends beyond EOD, truncated [ 692.878704] FAULT_INJECTION: forcing a failure. [ 692.878704] name failslab, interval 1, probability 0, space 0, times 0 [ 692.906056] CPU: 0 PID: 12934 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 692.913053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.913060] Call Trace: [ 692.913083] dump_stack+0x172/0x1f0 [ 692.913106] should_fail.cold+0xa/0x1b [ 692.913126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 692.913143] ? lock_downgrade+0x880/0x880 [ 692.913169] __should_failslab+0x121/0x190 [ 692.913189] should_failslab+0x9/0x14 [ 692.913205] kmem_cache_alloc+0x2ae/0x700 [ 692.913296] ? __kernel_text_address+0xd/0x40 [ 692.913336] ? unwind_get_return_address+0x61/0xa0 [ 692.913359] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 692.942081] idr_get_free+0x50f/0xa13 [ 692.942110] idr_alloc_u32+0x1d6/0x390 [ 692.942130] ? __fprop_inc_percpu_max+0x230/0x230 [ 692.942164] u32_change+0x223b/0x2e9d [ 692.942190] ? u32_dump+0x1080/0x1080 [ 692.942202] ? u32_init+0x6e4/0xd10 [ 692.942229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.950257] ? lockdep_rtnl_is_held+0x26/0x30 [ 692.950272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 692.950288] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 692.950301] ? u32_dump+0x1080/0x1080 [ 692.950320] tc_new_tfilter+0xc54/0x1790 [ 692.950349] ? tc_del_tfilter+0xe60/0xe60 [ 692.950365] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 692.950379] ? kfree_skbmem+0xcb/0x150 [ 692.950396] ? mutex_trylock+0x1e0/0x1e0 [ 692.950432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.950448] ? tc_del_tfilter+0xe60/0xe60 [ 692.950464] rtnetlink_rcv_msg+0x463/0xb00 [ 692.959079] ? rtnetlink_put_metrics+0x560/0x560 [ 692.959098] ? netdev_pick_tx+0x300/0x300 [ 692.959117] ? netlink_deliver_tap+0x22d/0xc20 [ 692.959136] ? find_held_lock+0x35/0x130 [ 692.959155] netlink_rcv_skb+0x17d/0x460 [ 692.959171] ? rtnetlink_put_metrics+0x560/0x560 [ 692.959188] ? netlink_ack+0xb30/0xb30 [ 692.959204] ? kasan_check_read+0x11/0x20 [ 692.959226] ? netlink_deliver_tap+0x254/0xc20 [ 692.959246] rtnetlink_rcv+0x1d/0x30 [ 692.959260] netlink_unicast+0x537/0x720 [ 692.959279] ? netlink_attachskb+0x770/0x770 [ 692.959298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.969740] netlink_sendmsg+0x8ae/0xd70 [ 692.969762] ? netlink_unicast+0x720/0x720 [ 692.969784] ? selinux_socket_sendmsg+0x36/0x40 [ 692.969804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.969819] ? security_socket_sendmsg+0x8d/0xc0 [ 692.969832] ? netlink_unicast+0x720/0x720 [ 692.969848] sock_sendmsg+0xd7/0x130 [ 692.969865] ___sys_sendmsg+0x3e2/0x920 [ 692.969884] ? copy_msghdr_from_user+0x430/0x430 [ 692.969904] ? lock_downgrade+0x880/0x880 [ 692.969922] ? kasan_check_read+0x11/0x20 [ 692.969942] ? __fget+0x367/0x540 [ 692.969960] ? iterate_fd+0x360/0x360 [ 692.969977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 692.977634] ? proc_fail_nth_write+0x9d/0x1e0 [ 692.977654] ? __fget_light+0x1a9/0x230 [ 692.977671] ? __fdget+0x1b/0x20 [ 692.977685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.977698] ? sockfd_lookup_light+0xcb/0x180 [ 692.977716] __sys_sendmmsg+0x1bf/0x4e0 [ 692.977737] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 692.977756] ? kasan_check_write+0x14/0x20 [ 692.977786] ? __sb_end_write+0xd9/0x110 [ 692.983210] loop4: p5 size 1073741824 extends beyond EOD, [ 692.986404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 692.986419] ? fput+0x128/0x1a0 [ 692.986436] ? ksys_write+0x1f1/0x2d0 [ 692.986457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 692.986473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 692.986487] ? do_syscall_64+0x26/0x620 [ 692.986503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.986517] ? do_syscall_64+0x26/0x620 [ 692.986535] __x64_sys_sendmmsg+0x9d/0x100 [ 692.986551] do_syscall_64+0xfd/0x620 [ 692.990544] truncated [ 692.993954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.993967] RIP: 0033:0x459a29 [ 692.993982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.993991] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 692.994007] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 692.994015] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 692.994024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.994032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 692.994041] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 693.344893] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:21 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500600001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, @in6={0xa, 0x4e24, 0x1f, @remote, 0x88}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e20, 0xffff, @remote, 0x80000001}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e24, 0x40, @empty, 0x7ff}, @in6={0xa, 0x4e21, 0x0, @remote, 0x5}], 0xac) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:21 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x5aa}]) 19:46:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) 19:46:21 executing program 0 (fault-call:9 fault-nth:12): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:22 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xa]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 693.525196] FAULT_INJECTION: forcing a failure. [ 693.525196] name failslab, interval 1, probability 0, space 0, times 0 [ 693.579723] CPU: 1 PID: 12950 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 693.586720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.596093] Call Trace: [ 693.598711] dump_stack+0x172/0x1f0 [ 693.602374] should_fail.cold+0xa/0x1b [ 693.606293] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 693.611426] ? lock_downgrade+0x880/0x880 [ 693.615610] __should_failslab+0x121/0x190 [ 693.619895] should_failslab+0x9/0x14 [ 693.623721] kmem_cache_alloc+0x2ae/0x700 19:46:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x700}]) [ 693.627914] ? __kernel_text_address+0xd/0x40 [ 693.632444] ? unwind_get_return_address+0x61/0xa0 [ 693.637408] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 693.642979] idr_get_free+0x50f/0xa13 [ 693.646821] idr_alloc_u32+0x1d6/0x390 [ 693.653260] ? __fprop_inc_percpu_max+0x230/0x230 [ 693.658155] u32_change+0x223b/0x2e9d [ 693.661997] ? u32_dump+0x1080/0x1080 [ 693.665826] ? u32_init+0x6e4/0xd10 [ 693.669493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.675058] ? lockdep_rtnl_is_held+0x26/0x30 [ 693.679569] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 693.685130] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 693.689821] ? u32_dump+0x1080/0x1080 [ 693.693648] tc_new_tfilter+0xc54/0x1790 [ 693.697746] ? tc_del_tfilter+0xe60/0xe60 [ 693.701921] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 693.706441] ? kfree_skbmem+0xcb/0x150 [ 693.710356] ? mutex_trylock+0x1e0/0x1e0 [ 693.714469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.720036] ? tc_del_tfilter+0xe60/0xe60 [ 693.724297] rtnetlink_rcv_msg+0x463/0xb00 [ 693.728556] ? rtnetlink_put_metrics+0x560/0x560 [ 693.733327] ? netdev_pick_tx+0x300/0x300 [ 693.737497] ? netlink_deliver_tap+0x22d/0xc20 [ 693.742106] ? find_held_lock+0x35/0x130 [ 693.746194] netlink_rcv_skb+0x17d/0x460 [ 693.750279] ? rtnetlink_put_metrics+0x560/0x560 [ 693.755048] ? netlink_ack+0xb30/0xb30 [ 693.758933] ? kasan_check_read+0x11/0x20 [ 693.763096] ? netlink_deliver_tap+0x254/0xc20 [ 693.767710] rtnetlink_rcv+0x1d/0x30 [ 693.771449] netlink_unicast+0x537/0x720 [ 693.775533] ? netlink_attachskb+0x770/0x770 [ 693.779963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.785529] netlink_sendmsg+0x8ae/0xd70 [ 693.789614] ? netlink_unicast+0x720/0x720 [ 693.793878] ? selinux_socket_sendmsg+0x36/0x40 [ 693.798566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.804124] ? security_socket_sendmsg+0x8d/0xc0 [ 693.808900] ? netlink_unicast+0x720/0x720 [ 693.813418] sock_sendmsg+0xd7/0x130 [ 693.817150] ___sys_sendmsg+0x3e2/0x920 [ 693.821145] ? copy_msghdr_from_user+0x430/0x430 [ 693.826015] ? lock_downgrade+0x880/0x880 19:46:22 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 693.830536] ? kasan_check_read+0x11/0x20 [ 693.834706] ? __fget+0x367/0x540 [ 693.838188] ? iterate_fd+0x360/0x360 [ 693.842009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 693.847573] ? proc_fail_nth_write+0x9d/0x1e0 [ 693.852086] ? __fget_light+0x1a9/0x230 [ 693.852104] ? __fdget+0x1b/0x20 [ 693.852118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.852135] ? sockfd_lookup_light+0xcb/0x180 [ 693.869509] __sys_sendmmsg+0x1bf/0x4e0 [ 693.869532] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 693.869551] ? kasan_check_write+0x14/0x20 [ 693.869575] ? __sb_end_write+0xd9/0x110 [ 693.869594] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 693.869607] ? fput+0x128/0x1a0 [ 693.869621] ? ksys_write+0x1f1/0x2d0 [ 693.869638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 693.869650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 693.869663] ? do_syscall_64+0x26/0x620 [ 693.869677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.869693] ? do_syscall_64+0x26/0x620 [ 693.903607] __x64_sys_sendmmsg+0x9d/0x100 [ 693.903627] do_syscall_64+0xfd/0x620 [ 693.903645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.929687] RIP: 0033:0x459a29 [ 693.929704] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.929713] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 693.929728] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 693.929737] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 19:46:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) fcntl$addseals(r0, 0x409, 0xf1fe2c9e57ff0a56) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:22 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x28]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 693.929744] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 693.929752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 693.929760] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 694.019839] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r5 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r6 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r6) r7 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r8 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r8) r9 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r9) r10 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x95, 0x209e1e, 0x3, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r11, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r12}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r12, 0x7, 0x10}, 0xc) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r12, 0x4c4, 0x8}, 0xc) r14 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r14, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r15 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r15) r16 = syz_open_pts(r1, 0xa80) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x1e) r18 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r20 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r19, r21) r22 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r24 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r23, r25) getgroups(0x6, &(0x7f0000000400)=[r19, 0xee01, r25, 0xee01, 0xee00, 0xee00]) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000000)="3a7e588fd29189526f81644aeaa7f674fab3b3017ecb5b9285dc2f804bc0c9bb554ec7e6", 0x24}, {&(0x7f0000000100)}, {&(0x7f0000000200)="7209fb4c544f9186b66b1c385177a939f9f0fc3f8e7ba8aa7909b80a4810069c9fac576fae2b7e34ce3abc61e4e34f682d4189cddc19e64f6abf94fce7cdd4489b68ba699ee84096d04feee5f2f1a1f33a23fae0693719fd40b9662616ec7f18a7896280ad7e0e3e38628ef9a4d59807d613ad2a22dbd72c8a8022f64dc45df0fd7e7ab0fcc3b90b4a51baebdcbe8b6a781425d3d49bfa5db62fcdf8003cbbb70601dbc75aa947f109b49bbde588066fa66078af551a147d3cbb8a06808d8ad66d33b2e621407e736d2ca9dd767f8cf834efe6f96a43ecb7055bf9c8d64cd182120147c0d8b233794f14de3fce7acba8208f35", 0xf3}, {&(0x7f0000000300)="20d0fb76de9562c959e9a9dd5a653235ff3dc2284b419b6dbcdb025c94e68e6329d6d06a4cd070d32cc419de3ea459010e9477e2f185dcfac511ad6c07d5fd010d8849559cb89ff0ba4e82c35378546f1241852505e5876a83cd487028cf4c40c2b4f61633ae1f70ddeaf11affcbf27b55a30a0b62fdd83d938a1c790740cbb2d9b5d2a65c4b79cdfe00357c568445f4b298ccde572c1daca2578e9eea5c543a6df150f81c17b38d12f69225939198dded10d1e36fc73a695270e623fbb6", 0xbe}], 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=0xee00, @ANYRES32=r26, @ANYBLOB='\x00\x00\b\x00'], 0xb0, 0x20000000}, 0x84809) [ 694.038127] loop4: partition table partially beyond EOD, truncated [ 694.055561] loop4: p1 start 1 is beyond EOD, truncated [ 694.088211] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 694.138252] loop4: p3 size 2 extends beyond EOD, truncated [ 694.206383] loop4: p4 size 32768 extends beyond EOD, truncated [ 694.222577] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 694.253682] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:23 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500680001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:23 executing program 0 (fault-call:9 fault-nth:13): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x950}]) 19:46:23 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3c]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdbf, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0xfffffde6, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:23 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x60]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 694.702248] FAULT_INJECTION: forcing a failure. [ 694.702248] name failslab, interval 1, probability 0, space 0, times 0 [ 694.799848] CPU: 0 PID: 13206 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 694.806860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.816236] Call Trace: [ 694.818852] dump_stack+0x172/0x1f0 [ 694.822507] should_fail.cold+0xa/0x1b [ 694.826459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 694.831591] ? lock_downgrade+0x880/0x880 [ 694.835768] __should_failslab+0x121/0x190 [ 694.840022] should_failslab+0x9/0x14 [ 694.843837] kmem_cache_alloc+0x2ae/0x700 [ 694.848005] ? __kernel_text_address+0xd/0x40 [ 694.852527] ? unwind_get_return_address+0x61/0xa0 [ 694.857491] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 694.863062] idr_get_free+0x50f/0xa13 [ 694.867342] idr_alloc_u32+0x1d6/0x390 [ 694.871264] ? __fprop_inc_percpu_max+0x230/0x230 [ 694.876152] u32_change+0x223b/0x2e9d [ 694.879984] ? u32_dump+0x1080/0x1080 [ 694.883807] ? u32_init+0x6e4/0xd10 [ 694.887479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.893045] ? lockdep_rtnl_is_held+0x26/0x30 [ 694.897608] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 694.903144] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 694.907820] ? u32_dump+0x1080/0x1080 [ 694.911618] tc_new_tfilter+0xc54/0x1790 [ 694.915695] ? tc_del_tfilter+0xe60/0xe60 [ 694.919847] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 694.924245] ? kfree_skbmem+0xcb/0x150 [ 694.928139] ? mutex_trylock+0x1e0/0x1e0 [ 694.932210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.937735] ? tc_del_tfilter+0xe60/0xe60 [ 694.941922] rtnetlink_rcv_msg+0x463/0xb00 [ 694.946163] ? rtnetlink_put_metrics+0x560/0x560 [ 694.950919] ? netdev_pick_tx+0x300/0x300 [ 694.955066] ? netlink_deliver_tap+0x22d/0xc20 [ 694.959655] ? find_held_lock+0x35/0x130 [ 694.963725] netlink_rcv_skb+0x17d/0x460 [ 694.967797] ? rtnetlink_put_metrics+0x560/0x560 [ 694.972640] ? netlink_ack+0xb30/0xb30 [ 694.976530] ? kasan_check_read+0x11/0x20 [ 694.980676] ? netlink_deliver_tap+0x254/0xc20 [ 694.985251] rtnetlink_rcv+0x1d/0x30 [ 694.988955] netlink_unicast+0x537/0x720 [ 694.993022] ? netlink_attachskb+0x770/0x770 [ 694.997443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.002990] netlink_sendmsg+0x8ae/0xd70 [ 695.007061] ? netlink_unicast+0x720/0x720 [ 695.011299] ? selinux_socket_sendmsg+0x36/0x40 [ 695.015972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.021621] ? security_socket_sendmsg+0x8d/0xc0 [ 695.026863] ? netlink_unicast+0x720/0x720 [ 695.031126] sock_sendmsg+0xd7/0x130 [ 695.034866] ___sys_sendmsg+0x3e2/0x920 [ 695.038868] ? copy_msghdr_from_user+0x430/0x430 [ 695.043654] ? lock_downgrade+0x880/0x880 [ 695.047821] ? kasan_check_read+0x11/0x20 [ 695.051995] ? __fget+0x367/0x540 [ 695.055468] ? iterate_fd+0x360/0x360 [ 695.059288] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.064874] ? proc_fail_nth_write+0x9d/0x1e0 [ 695.069387] ? __fget_light+0x1a9/0x230 [ 695.073378] ? __fdget+0x1b/0x20 [ 695.076783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.076800] ? sockfd_lookup_light+0xcb/0x180 [ 695.076819] __sys_sendmmsg+0x1bf/0x4e0 [ 695.076839] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 695.076859] ? kasan_check_write+0x14/0x20 19:46:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa00}]) 19:46:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x8000000803, 0x0) write(r0, &(0x7f0000000000)="220000002000070700be0000090007010200000000000000002000000500", 0x1e) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) r2 = accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000140)=0x60) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r3, 0x1, [], r5, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@mcast2, 0x46, r5}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:23 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf0]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 695.076883] ? __sb_end_write+0xd9/0x110 [ 695.086897] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.086913] ? fput+0x128/0x1a0 [ 695.086929] ? ksys_write+0x1f1/0x2d0 [ 695.086949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.086964] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.086979] ? do_syscall_64+0x26/0x620 [ 695.086997] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.087011] ? do_syscall_64+0x26/0x620 [ 695.087031] __x64_sys_sendmmsg+0x9d/0x100 [ 695.087050] do_syscall_64+0xfd/0x620 [ 695.087069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.087082] RIP: 0033:0x459a29 [ 695.087098] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.087106] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 695.087122] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 695.087133] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 19:46:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000240)={0x200, @tick=0xc68, 0x20, {0x48, 0x80}, 0x1, 0x2, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 695.116273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 695.125765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 695.125775] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 695.233540] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:23 executing program 0 (fault-call:9 fault-nth:14): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 695.266461] loop4: partition table partially beyond EOD, truncated [ 695.302637] loop4: p1 start 1 is beyond EOD, truncated [ 695.338504] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 695.380500] loop4: p3 size 2 extends beyond EOD, truncated [ 695.391579] loop4: p4 size 32768 extends beyond EOD, truncated [ 695.406594] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 695.418407] loop4: p6 size 32768 extends beyond EOD, truncated [ 695.485698] FAULT_INJECTION: forcing a failure. [ 695.485698] name failslab, interval 1, probability 0, space 0, times 0 [ 695.520155] CPU: 1 PID: 13378 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 695.527148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.536521] Call Trace: [ 695.539135] dump_stack+0x172/0x1f0 [ 695.542817] should_fail.cold+0xa/0x1b [ 695.546725] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.551847] ? lock_downgrade+0x880/0x880 [ 695.556015] __should_failslab+0x121/0x190 [ 695.560263] should_failslab+0x9/0x14 [ 695.564759] kmem_cache_alloc+0x2ae/0x700 [ 695.569372] ? __kernel_text_address+0xd/0x40 [ 695.573885] ? unwind_get_return_address+0x61/0xa0 [ 695.578822] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 695.584391] idr_get_free+0x50f/0xa13 [ 695.588209] idr_alloc_u32+0x1d6/0x390 [ 695.592095] ? __fprop_inc_percpu_max+0x230/0x230 [ 695.597026] u32_change+0x223b/0x2e9d [ 695.600864] ? u32_dump+0x1080/0x1080 [ 695.604735] ? u32_init+0x6e4/0xd10 [ 695.608370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.613924] ? lockdep_rtnl_is_held+0x26/0x30 [ 695.618503] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.624052] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 695.628853] ? u32_dump+0x1080/0x1080 [ 695.632663] tc_new_tfilter+0xc54/0x1790 [ 695.636731] ? tc_del_tfilter+0xe60/0xe60 [ 695.640899] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 695.645307] ? kfree_skbmem+0xcb/0x150 [ 695.649183] ? mutex_trylock+0x1e0/0x1e0 [ 695.653246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.659877] ? tc_del_tfilter+0xe60/0xe60 [ 695.664118] rtnetlink_rcv_msg+0x463/0xb00 [ 695.668366] ? rtnetlink_put_metrics+0x560/0x560 [ 695.673118] ? netdev_pick_tx+0x300/0x300 [ 695.677262] ? netlink_deliver_tap+0x22d/0xc20 [ 695.681849] ? find_held_lock+0x35/0x130 [ 695.685918] netlink_rcv_skb+0x17d/0x460 [ 695.689975] ? rtnetlink_put_metrics+0x560/0x560 [ 695.694734] ? netlink_ack+0xb30/0xb30 [ 695.698613] ? kasan_check_read+0x11/0x20 [ 695.702773] ? netlink_deliver_tap+0x254/0xc20 [ 695.707376] rtnetlink_rcv+0x1d/0x30 [ 695.711171] netlink_unicast+0x537/0x720 [ 695.715222] ? netlink_attachskb+0x770/0x770 [ 695.719632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.725173] netlink_sendmsg+0x8ae/0xd70 [ 695.729226] ? netlink_unicast+0x720/0x720 [ 695.733453] ? selinux_socket_sendmsg+0x36/0x40 [ 695.738650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.744203] ? security_socket_sendmsg+0x8d/0xc0 [ 695.749481] ? netlink_unicast+0x720/0x720 [ 695.753720] sock_sendmsg+0xd7/0x130 [ 695.757429] ___sys_sendmsg+0x3e2/0x920 [ 695.761406] ? copy_msghdr_from_user+0x430/0x430 [ 695.766168] ? lock_downgrade+0x880/0x880 [ 695.770320] ? kasan_check_read+0x11/0x20 [ 695.774457] ? __fget+0x367/0x540 [ 695.778005] ? iterate_fd+0x360/0x360 [ 695.781810] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.787811] ? proc_fail_nth_write+0x9d/0x1e0 [ 695.792398] ? __fget_light+0x1a9/0x230 [ 695.796360] ? __fdget+0x1b/0x20 [ 695.799726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.805263] ? sockfd_lookup_light+0xcb/0x180 [ 695.809796] __sys_sendmmsg+0x1bf/0x4e0 [ 695.813809] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 695.818125] ? kasan_check_write+0x14/0x20 [ 695.822404] ? __sb_end_write+0xd9/0x110 [ 695.826465] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.832040] ? fput+0x128/0x1a0 [ 695.835308] ? ksys_write+0x1f1/0x2d0 [ 695.839100] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.843858] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.848625] ? do_syscall_64+0x26/0x620 [ 695.852622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.857997] ? do_syscall_64+0x26/0x620 [ 695.861978] __x64_sys_sendmmsg+0x9d/0x100 [ 695.866213] do_syscall_64+0xfd/0x620 [ 695.870002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.875179] RIP: 0033:0x459a29 [ 695.878364] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.897261] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 695.904976] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 695.912253] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 695.919519] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 695.926802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 695.934061] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:24 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105006c0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:24 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x300]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r1) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) socket$pppoe(0x18, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xaf0}]) 19:46:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ftruncate(r1, 0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:24 executing program 0 (fault-call:9 fault-nth:15): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:24 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x500]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xec8}]) [ 696.317486] FAULT_INJECTION: forcing a failure. [ 696.317486] name failslab, interval 1, probability 0, space 0, times 0 [ 696.379811] CPU: 0 PID: 13557 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 696.386802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.396168] Call Trace: [ 696.396195] dump_stack+0x172/0x1f0 [ 696.396218] should_fail.cold+0xa/0x1b [ 696.396239] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 696.396257] ? lock_downgrade+0x880/0x880 [ 696.396284] __should_failslab+0x121/0x190 [ 696.396302] should_failslab+0x9/0x14 [ 696.402522] kmem_cache_alloc+0x2ae/0x700 [ 696.419874] ? __kernel_text_address+0xd/0x40 [ 696.419892] ? unwind_get_return_address+0x61/0xa0 [ 696.419915] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 696.427852] idr_get_free+0x50f/0xa13 [ 696.427882] idr_alloc_u32+0x1d6/0x390 [ 696.427901] ? __fprop_inc_percpu_max+0x230/0x230 [ 696.427936] u32_change+0x223b/0x2e9d [ 696.427962] ? u32_dump+0x1080/0x1080 [ 696.427976] ? u32_init+0x6e4/0xd10 [ 696.428008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.428029] ? lockdep_rtnl_is_held+0x26/0x30 19:46:24 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x543]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:25 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x600]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 696.428045] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.482401] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 696.487104] ? u32_dump+0x1080/0x1080 [ 696.491143] tc_new_tfilter+0xc54/0x1790 [ 696.495235] ? tc_del_tfilter+0xe60/0xe60 [ 696.499402] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 696.503834] ? mutex_trylock+0x1e0/0x1e0 [ 696.507942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.513501] ? tc_del_tfilter+0xe60/0xe60 [ 696.517661] rtnetlink_rcv_msg+0x463/0xb00 [ 696.521928] ? rtnetlink_put_metrics+0x560/0x560 [ 696.526718] ? netdev_pick_tx+0x300/0x300 [ 696.530985] ? netlink_deliver_tap+0x22d/0xc20 [ 696.535588] ? find_held_lock+0x35/0x130 [ 696.539855] netlink_rcv_skb+0x17d/0x460 [ 696.543945] ? rtnetlink_put_metrics+0x560/0x560 [ 696.548728] ? netlink_ack+0xb30/0xb30 [ 696.552670] ? kasan_check_read+0x11/0x20 [ 696.556851] ? netlink_deliver_tap+0x254/0xc20 [ 696.561453] rtnetlink_rcv+0x1d/0x30 [ 696.565175] netlink_unicast+0x537/0x720 [ 696.569257] ? netlink_attachskb+0x770/0x770 [ 696.573698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.579266] netlink_sendmsg+0x8ae/0xd70 [ 696.583354] ? netlink_unicast+0x720/0x720 [ 696.587594] ? selinux_socket_sendmsg+0x36/0x40 [ 696.592262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.597810] ? security_socket_sendmsg+0x8d/0xc0 [ 696.602574] ? netlink_unicast+0x720/0x720 [ 696.606822] sock_sendmsg+0xd7/0x130 [ 696.610556] ___sys_sendmsg+0x3e2/0x920 [ 696.614545] ? copy_msghdr_from_user+0x430/0x430 [ 696.619342] ? lock_downgrade+0x880/0x880 [ 696.623495] ? kasan_check_read+0x11/0x20 [ 696.627642] ? __fget+0x367/0x540 [ 696.631089] ? iterate_fd+0x360/0x360 [ 696.634910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.640449] ? proc_fail_nth_write+0x9d/0x1e0 [ 696.644951] ? __fget_light+0x1a9/0x230 [ 696.648934] ? __fdget+0x1b/0x20 [ 696.652289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.657828] ? sockfd_lookup_light+0xcb/0x180 [ 696.662328] __sys_sendmmsg+0x1bf/0x4e0 [ 696.666297] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 696.670613] ? kasan_check_write+0x14/0x20 [ 696.674875] ? __sb_end_write+0xd9/0x110 [ 696.678953] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.684479] ? fput+0x128/0x1a0 [ 696.687750] ? ksys_write+0x1f1/0x2d0 [ 696.691560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.696405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.701163] ? do_syscall_64+0x26/0x620 [ 696.705133] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.710506] ? do_syscall_64+0x26/0x620 [ 696.714490] __x64_sys_sendmmsg+0x9d/0x100 [ 696.718736] do_syscall_64+0xfd/0x620 [ 696.722551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.727825] RIP: 0033:0x459a29 [ 696.731024] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.750040] RSP: 002b:00007f7f93dd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 696.757759] RAX: ffffffffffffffda RBX: 00007f7f93dd6c90 RCX: 0000000000459a29 [ 696.765039] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 696.772344] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 696.779604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93dd76d4 [ 696.786878] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 696.860540] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 696.865307] loop4: partition table partially beyond EOD, truncated [ 696.933015] loop4: p1 start 1 is beyond EOD, truncated [ 696.947109] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 697.003187] loop4: p3 size 2 extends beyond EOD, truncated [ 697.035744] loop4: p4 size 32768 extends beyond EOD, truncated 19:46:25 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500740001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000200)={0x5, 0x7, "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"}) 19:46:25 executing program 0 (fault-call:9 fault-nth:16): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1035}]) 19:46:25 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x608]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 697.049435] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 697.059411] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:25 executing program 3: prctl$PR_GET_NO_NEW_PRIVS(0x27) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080)={0x8, 0x0, 0x400, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10) unlink(&(0x7f00000000c0)='./file0\x00') 19:46:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000240)={0x4, 0x4, {0x0, 0x1, 0x81, 0x2, 0xc8d}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r3, 0x1, [], r5, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x7, 0xff, 0x6, 0x9, 0x0, 0xf80, 0x1408, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x928, 0x4, @perf_config_ext={0x8}, 0x404, 0x0, 0x7fff, 0x0, 0x8, 0x9, 0x1ff}, 0x0, 0x5, r3, 0xa) 19:46:25 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x689]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 697.174810] FAULT_INJECTION: forcing a failure. [ 697.174810] name failslab, interval 1, probability 0, space 0, times 0 [ 697.220206] CPU: 1 PID: 13720 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 697.227196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.236594] Call Trace: [ 697.239208] dump_stack+0x172/0x1f0 [ 697.242868] should_fail.cold+0xa/0x1b [ 697.246789] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.251924] ? lock_downgrade+0x880/0x880 [ 697.256136] __should_failslab+0x121/0x190 [ 697.260400] should_failslab+0x9/0x14 [ 697.264221] kmem_cache_alloc+0x2ae/0x700 [ 697.268653] ? __kernel_text_address+0xd/0x40 [ 697.273169] ? unwind_get_return_address+0x61/0xa0 [ 697.278133] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 697.283701] idr_get_free+0x50f/0xa13 [ 697.287528] idr_alloc_u32+0x1d6/0x390 [ 697.291437] ? __fprop_inc_percpu_max+0x230/0x230 [ 697.296304] u32_change+0x223b/0x2e9d [ 697.300132] ? u32_dump+0x1080/0x1080 [ 697.303956] ? u32_init+0x6e4/0xd10 [ 697.307617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.313181] ? lockdep_rtnl_is_held+0x26/0x30 [ 697.317694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.323249] ? u32_lookup_ht.isra.0+0x162/0x1e0 [ 697.327928] ? u32_dump+0x1080/0x1080 [ 697.331737] tc_new_tfilter+0xc54/0x1790 [ 697.335826] ? tc_del_tfilter+0xe60/0xe60 [ 697.339996] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 697.344426] ? kfree_skbmem+0xcb/0x150 [ 697.348349] ? mutex_trylock+0x1e0/0x1e0 [ 697.352456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.358036] ? tc_del_tfilter+0xe60/0xe60 [ 697.362209] rtnetlink_rcv_msg+0x463/0xb00 [ 697.366470] ? rtnetlink_put_metrics+0x560/0x560 [ 697.371237] ? netdev_pick_tx+0x300/0x300 [ 697.375398] ? netlink_deliver_tap+0x22d/0xc20 [ 697.379995] ? find_held_lock+0x35/0x130 [ 697.384088] netlink_rcv_skb+0x17d/0x460 [ 697.388170] ? rtnetlink_put_metrics+0x560/0x560 [ 697.392953] ? netlink_ack+0xb30/0xb30 [ 697.397039] ? kasan_check_read+0x11/0x20 [ 697.401213] ? netlink_deliver_tap+0x254/0xc20 [ 697.405812] rtnetlink_rcv+0x1d/0x30 [ 697.409538] netlink_unicast+0x537/0x720 [ 697.413626] ? netlink_attachskb+0x770/0x770 [ 697.418058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.423619] netlink_sendmsg+0x8ae/0xd70 [ 697.427708] ? netlink_unicast+0x720/0x720 [ 697.431971] ? selinux_socket_sendmsg+0x36/0x40 [ 697.436665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.442223] ? security_socket_sendmsg+0x8d/0xc0 [ 697.446992] ? netlink_unicast+0x720/0x720 [ 697.451239] sock_sendmsg+0xd7/0x130 [ 697.454961] ___sys_sendmsg+0x3e2/0x920 [ 697.458948] ? copy_msghdr_from_user+0x430/0x430 [ 697.463839] ? lock_downgrade+0x880/0x880 [ 697.468011] ? kasan_check_read+0x11/0x20 [ 697.472174] ? __fget+0x367/0x540 [ 697.475644] ? iterate_fd+0x360/0x360 [ 697.479456] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.485007] ? proc_fail_nth_write+0x9d/0x1e0 [ 697.489533] ? __fget_light+0x1a9/0x230 [ 697.493536] ? __fdget+0x1b/0x20 [ 697.496926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.502491] ? sockfd_lookup_light+0xcb/0x180 [ 697.507015] __sys_sendmmsg+0x1bf/0x4e0 [ 697.511020] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 697.515361] ? kasan_check_write+0x14/0x20 [ 697.519624] ? __sb_end_write+0xd9/0x110 [ 697.523713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.529275] ? fput+0x128/0x1a0 [ 697.532588] ? ksys_write+0x1f1/0x2d0 [ 697.536418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 697.541209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 697.545994] ? do_syscall_64+0x26/0x620 [ 697.549994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.555383] ? do_syscall_64+0x26/0x620 [ 697.559384] __x64_sys_sendmmsg+0x9d/0x100 [ 697.563638] do_syscall_64+0xfd/0x620 [ 697.567459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.572665] RIP: 0033:0x459a29 [ 697.575865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.575875] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 697.575892] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 697.575901] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 19:46:26 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x700]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x10) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x1}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f00000000c0)=""/26) 19:46:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 697.575910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 697.575918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 697.575930] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1068}]) [ 697.660056] audit: type=1800 audit(1570045586.208:285): pid=13846 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17187 res=0 [ 697.695665] audit: type=1804 audit(1570045586.208:286): pid=13846 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/886/file0" dev="sda1" ino=17187 res=1 [ 697.738547] audit: type=1800 audit(1570045586.208:287): pid=13846 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17187 res=0 [ 697.767879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 697.778769] loop4: partition table partially beyond EOD, truncated [ 697.795752] loop4: p1 start 1 is beyond EOD, truncated [ 697.811028] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 697.888721] loop4: p3 size 2 extends beyond EOD, truncated [ 697.924180] loop4: p4 size 32768 extends beyond EOD, truncated [ 697.933491] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 697.941532] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:26 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="020105007a0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:26 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x806]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:26 executing program 0 (fault-call:9 fault-nth:17): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1440}]) 19:46:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) r4 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) ioctl$ASHMEM_GET_SIZE(r4, 0x7704, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000240)={0x9b0000, 0x8001, 0x7, [], &(0x7f00000000c0)={0x980915, 0x80000001, [], @value=0x3}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:26 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xa00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 698.260264] FAULT_INJECTION: forcing a failure. [ 698.260264] name failslab, interval 1, probability 0, space 0, times 0 19:46:26 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xd00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 698.344818] CPU: 0 PID: 13981 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 698.351808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.361179] Call Trace: [ 698.363792] dump_stack+0x172/0x1f0 [ 698.367530] should_fail.cold+0xa/0x1b [ 698.371443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.376573] ? lock_downgrade+0x880/0x880 [ 698.380758] __should_failslab+0x121/0x190 [ 698.385012] should_failslab+0x9/0x14 [ 698.385030] kmem_cache_alloc_node_trace+0x274/0x720 [ 698.385052] ? __alloc_skb+0xd5/0x5f0 [ 698.385077] __kmalloc_node_track_caller+0x3d/0x80 [ 698.385094] __kmalloc_reserve.isra.0+0x40/0xf0 [ 698.385117] __alloc_skb+0x10b/0x5f0 [ 698.385134] ? skb_scrub_packet+0x490/0x490 [ 698.385149] ? lockdep_hardirqs_on+0x415/0x5d0 [ 698.385173] ? trace_hardirqs_on+0x67/0x220 [ 698.394092] tc_chain_notify+0xcf/0x200 [ 698.394111] __tcf_chain_put+0x380/0x500 [ 698.394127] tc_new_tfilter+0xdae/0x1790 [ 698.394149] ? tc_del_tfilter+0xe60/0xe60 [ 698.394166] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 698.394178] ? kfree_skbmem+0xcb/0x150 [ 698.394198] ? mutex_trylock+0x1e0/0x1e0 [ 698.394238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.394254] ? tc_del_tfilter+0xe60/0xe60 [ 698.394268] rtnetlink_rcv_msg+0x463/0xb00 [ 698.394287] ? rtnetlink_put_metrics+0x560/0x560 [ 698.394305] ? netdev_pick_tx+0x300/0x300 [ 698.394324] ? netlink_deliver_tap+0x22d/0xc20 [ 698.394342] ? find_held_lock+0x35/0x130 [ 698.394360] netlink_rcv_skb+0x17d/0x460 [ 698.394377] ? rtnetlink_put_metrics+0x560/0x560 [ 698.493988] ? netlink_ack+0xb30/0xb30 [ 698.497906] ? kasan_check_read+0x11/0x20 [ 698.502087] ? netlink_deliver_tap+0x254/0xc20 [ 698.506704] rtnetlink_rcv+0x1d/0x30 [ 698.510444] netlink_unicast+0x537/0x720 [ 698.514535] ? netlink_attachskb+0x770/0x770 [ 698.518975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.524547] netlink_sendmsg+0x8ae/0xd70 [ 698.528640] ? netlink_unicast+0x720/0x720 [ 698.532902] ? selinux_socket_sendmsg+0x36/0x40 [ 698.537596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 19:46:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x4) clock_getres(0x5, &(0x7f00000002c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700"/92]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000000000000000000000000000e83ec32fbe29c885c57100"/81]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000000c0)=0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/user\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) poll(&(0x7f0000000240)=[{r2, 0x40d0}], 0x1, 0x9) write$P9_RSTATu(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) [ 698.543171] ? security_socket_sendmsg+0x8d/0xc0 [ 698.547950] ? netlink_unicast+0x720/0x720 [ 698.552212] sock_sendmsg+0xd7/0x130 [ 698.555947] ___sys_sendmsg+0x3e2/0x920 [ 698.559951] ? copy_msghdr_from_user+0x430/0x430 [ 698.564731] ? lock_downgrade+0x880/0x880 [ 698.568897] ? kasan_check_read+0x11/0x20 [ 698.573064] ? __fget+0x367/0x540 [ 698.576537] ? iterate_fd+0x360/0x360 [ 698.580360] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.585950] ? proc_fail_nth_write+0x9d/0x1e0 [ 698.590497] ? __fget_light+0x1a9/0x230 19:46:27 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xe80]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 698.590514] ? __fdget+0x1b/0x20 [ 698.590532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.590548] ? sockfd_lookup_light+0xcb/0x180 [ 698.590566] __sys_sendmmsg+0x1bf/0x4e0 [ 698.590588] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 698.590607] ? kasan_check_write+0x14/0x20 [ 698.590634] ? __sb_end_write+0xd9/0x110 [ 698.590654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.590668] ? fput+0x128/0x1a0 [ 698.590685] ? ksys_write+0x1f1/0x2d0 [ 698.603665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.603682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 698.603695] ? do_syscall_64+0x26/0x620 [ 698.603710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.603724] ? do_syscall_64+0x26/0x620 [ 698.603747] __x64_sys_sendmmsg+0x9d/0x100 [ 698.603767] do_syscall_64+0xfd/0x620 [ 698.603784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.603800] RIP: 0033:0x459a29 [ 698.676729] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.695662] RSP: 002b:00007f7f93df7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 698.703403] RAX: ffffffffffffffda RBX: 00007f7f93df7c90 RCX: 0000000000459a29 [ 698.710696] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 698.717997] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 698.725290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93df86d4 [ 698.732568] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 698.745495] audit: type=1804 audit(1570045587.298:288): pid=13848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/886/file0" dev="sda1" ino=17187 res=1 19:46:27 executing program 3: alarm(0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:27 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x15e0}]) [ 698.857541] audit: type=1804 audit(1570045587.348:289): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/886/file0" dev="sda1" ino=17187 res=1 [ 698.931626] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 698.964105] loop4: partition table partially beyond EOD, truncated [ 698.986895] loop4: p1 start 1 is beyond EOD, truncated [ 699.010198] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 699.059794] loop4: p3 size 2 extends beyond EOD, truncated [ 699.070967] loop4: p4 size 32768 extends beyond EOD, truncated 19:46:27 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500820001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0x9, 0x6, 0x1, 0x401, 'syz1\x00', 0xe20f}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f00000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000925953f1cdcd44461f126eaadae67c0d38263a14bc7b71ef753839ae36b244ede30db578653c7c7b0505defae6d6b1786d15386d04758e5ce41c31aef84299b8e1bfa8a4500f4dc2bff20902d682c03507b0e8da55f0595ee4e6c5f0"]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) socket$key(0xf, 0x3, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:27 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2800]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 699.111139] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 699.126864] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x601, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='U\xbf\xe4X\x03\xb7I\x9b\xae\xee\x1d?\xd6\x86\x15\xf2\x84\x8e\xcdck\x89zP\xcaBR\xb8Aa\x87;\xc1\xf4W\x1b\xc0\xf95\xa4\'Hs.\x15\xa14\x8c\xbb\x94\xef\xcf\xb2\xea\xb4\xf7t\x81\x94\x96\x83\xe1Z2\x00\xaf#t\xf1\x84Ay\xed\xe9\x91\xd6&\xf0\xb0T\xc3\x1a\xed\xe4\x02\x86\xc0\x87&\xb3+\x8f') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) write$P9_RSTATu(r0, &(0x7f0000000100)={0x6b, 0x7d, 0x2, {{0x0, 0x50, 0xff, 0x92, {0x42, 0x3, 0x2}, 0x1000000, 0x3, 0x39500000, 0x3, 0x0, '', 0x0, '', 0xf, '/dev/sequencer\x00', 0xe, 'security/proc:'}, 0x6, '\\{@em0', r1, 0xffffffffffffffff, r3}}, 0x6b) 19:46:27 executing program 0 (fault-call:9 fault-nth:18): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x19b8}]) 19:46:27 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3580]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 699.273279] FAULT_INJECTION: forcing a failure. [ 699.273279] name failslab, interval 1, probability 0, space 0, times 0 [ 699.308698] CPU: 0 PID: 14230 Comm: syz-executor.0 Not tainted 4.19.76 #0 19:46:27 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000000f2, 0x0) ioctl$int_out(r1, 0x5, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r0, 0x1, [], r3, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000200)) [ 699.315685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.325054] Call Trace: [ 699.327673] dump_stack+0x172/0x1f0 [ 699.331334] should_fail.cold+0xa/0x1b [ 699.335244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.340370] ? save_stack+0x45/0xd0 [ 699.344019] ? kasan_kmalloc+0xce/0xf0 [ 699.347924] ? __kmalloc_node_track_caller+0x51/0x80 [ 699.353041] ? __kmalloc_reserve.isra.0+0x40/0xf0 [ 699.357898] ? __alloc_skb+0x10b/0x5f0 [ 699.361799] ? tc_chain_notify+0xcf/0x200 [ 699.365965] __should_failslab+0x121/0x190 19:46:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1b58}]) [ 699.370695] should_failslab+0x9/0x14 [ 699.370713] kmem_cache_alloc_node_trace+0x5a/0x720 [ 699.370734] ? __lock_is_held+0xb6/0x140 [ 699.370748] ? should_fail+0x14d/0x85c [ 699.370768] __kmalloc_node_track_caller+0x3d/0x80 [ 699.370787] __kmalloc_reserve.isra.0+0x40/0xf0 [ 699.370805] pskb_expand_head+0x154/0xe20 [ 699.370817] ? skb_put+0x183/0x1e0 [ 699.370832] ? memset+0x32/0x40 [ 699.370849] ? memcpy+0x46/0x50 [ 699.370870] netlink_trim+0x215/0x260 [ 699.370887] netlink_broadcast_filtered+0x64/0xb20 [ 699.370902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.370923] netlink_broadcast+0x3a/0x50 [ 699.370941] rtnetlink_send+0xa1/0x110 [ 699.370957] tc_chain_notify+0x151/0x200 [ 699.370976] __tcf_chain_put+0x380/0x500 [ 699.370996] tc_new_tfilter+0xdae/0x1790 [ 699.371023] ? tc_del_tfilter+0xe60/0xe60 [ 699.371037] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 699.371049] ? kfree_skbmem+0xcb/0x150 [ 699.371067] ? mutex_trylock+0x1e0/0x1e0 [ 699.371100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.371114] ? tc_del_tfilter+0xe60/0xe60 [ 699.371128] rtnetlink_rcv_msg+0x463/0xb00 [ 699.371147] ? rtnetlink_put_metrics+0x560/0x560 [ 699.371165] ? netdev_pick_tx+0x300/0x300 [ 699.371182] ? netlink_deliver_tap+0x22d/0xc20 [ 699.371199] ? find_held_lock+0x35/0x130 [ 699.371218] netlink_rcv_skb+0x17d/0x460 [ 699.371233] ? rtnetlink_put_metrics+0x560/0x560 [ 699.371250] ? netlink_ack+0xb30/0xb30 [ 699.371265] ? kasan_check_read+0x11/0x20 [ 699.371286] ? netlink_deliver_tap+0x254/0xc20 19:46:28 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3c00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:28 executing program 0 (fault-call:9 fault-nth:19): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 699.371306] rtnetlink_rcv+0x1d/0x30 [ 699.371320] netlink_unicast+0x537/0x720 [ 699.371340] ? netlink_attachskb+0x770/0x770 [ 699.371359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.371378] netlink_sendmsg+0x8ae/0xd70 [ 699.371399] ? netlink_unicast+0x720/0x720 [ 699.371421] ? selinux_socket_sendmsg+0x36/0x40 [ 699.371434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.371449] ? security_socket_sendmsg+0x8d/0xc0 [ 699.371469] ? netlink_unicast+0x720/0x720 [ 699.371485] sock_sendmsg+0xd7/0x130 [ 699.371501] ___sys_sendmsg+0x3e2/0x920 [ 699.371519] ? copy_msghdr_from_user+0x430/0x430 [ 699.371538] ? lock_downgrade+0x880/0x880 [ 699.371557] ? kasan_check_read+0x11/0x20 [ 699.371577] ? __fget+0x367/0x540 [ 699.371597] ? iterate_fd+0x360/0x360 [ 699.371615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.371629] ? proc_fail_nth_write+0x9d/0x1e0 [ 699.371648] ? __fget_light+0x1a9/0x230 [ 699.371664] ? __fdget+0x1b/0x20 [ 699.371679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 19:46:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xb1, 0x7f, 0x19, 0x0, 0x6, 0x944b43a5027a5dfc, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x100000001}, 0xc800, 0x7, 0x3ff, 0x5, 0x2, 0x1, 0x1}, 0xffffffffffffffff, 0xb, r1, 0x8) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) clone(0x2000, &(0x7f0000000240)="476dd0b0eb1dee36997fb62c9d98b44bdaa1b0c63a70caf94b5ed0d5038f826d55b09d1345e1002af6881f9b2ecac61ec426019fdefff7d2d4f9a76be853bb69875763aa", &(0x7f00000000c0), &(0x7f00000002c0), &(0x7f0000000300)="4ac848b982d0bcfead6ff659dcf1d1317e667419609d7c74378f9fcc5bfb552795466e145048f964fe2a7441f7536380ac8c6e2532e7998a5943127c93105b543969bb508e4dd24de35d01ce1c32bcbf8fadfdb62fe669472f7d37d94647591cf96ce1dc2b970958df01f6654d626347b7a08f521c180361284701489cd3") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1e) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r4, 0x1, [], r6, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000540), 0x4) r7 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, &(0x7f0000000680)={0x200, @time={0x0, 0x1c9c380}, 0xff, {0x26, 0x1}, 0x25, 0x2, 0x2}) wait4(r3, 0x0, 0x40000000, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="befeffff7d00000005fa000000000000000000000000000000000000000000000000000000000000000000000000000000001f00046e6f64657673656c66776d643573756d5b76626f786e657430707070302517007070703170726f63766d6e657431dd29776c616e302b5d91006367726f757070707031285c183f82751aacf2de8cca2560c6fb302e25903ec34b647d44210b25bfc20dc5e8a02a2df85b52f46d9346b7af1300e8b57db45085c06eedb2cd8448b0682801bff8c8fae1a18540ac3258e4302bbabfaeb3f2c812663635660444fcfcb27de5bfe6916b8f829172c0cc08ffdfdacc37a46e404f33bdb14145a1d6218d178ba3b3f0bdb7554800000a002f6465762f6e62642300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) [ 699.371692] ? sockfd_lookup_light+0xcb/0x180 [ 699.371710] __sys_sendmmsg+0x1bf/0x4e0 [ 699.371731] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 699.371746] ? kasan_check_write+0x14/0x20 [ 699.371774] ? __sb_end_write+0xd9/0x110 [ 699.371793] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.371807] ? fput+0x128/0x1a0 [ 699.371823] ? ksys_write+0x1f1/0x2d0 [ 699.371845] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.371860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.371876] ? do_syscall_64+0x26/0x620 [ 699.371891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.371906] ? do_syscall_64+0x26/0x620 [ 699.371925] __x64_sys_sendmmsg+0x9d/0x100 [ 699.371943] do_syscall_64+0xfd/0x620 [ 699.371962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.371975] RIP: 0033:0x459a29 [ 699.371989] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.371998] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 699.372014] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 699.372023] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 699.372031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 699.372041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 699.372049] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 699.831260] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 699.835834] loop4: partition table partially beyond EOD, truncated [ 699.936445] loop4: p1 start 1 is beyond EOD, truncated [ 699.942686] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 699.963762] loop4: p3 size 2 extends beyond EOD, truncated [ 699.984835] FAULT_INJECTION: forcing a failure. [ 699.984835] name failslab, interval 1, probability 0, space 0, times 0 [ 699.997325] CPU: 0 PID: 14376 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 700.004277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.004284] Call Trace: [ 700.004307] dump_stack+0x172/0x1f0 [ 700.004329] should_fail.cold+0xa/0x1b [ 700.004349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.004364] ? lock_downgrade+0x880/0x880 [ 700.004391] __should_failslab+0x121/0x190 [ 700.004409] should_failslab+0x9/0x14 [ 700.004424] kmem_cache_alloc_node_trace+0x274/0x720 [ 700.004442] ? __alloc_skb+0xd5/0x5f0 [ 700.023920] __kmalloc_node_track_caller+0x3d/0x80 [ 700.023939] __kmalloc_reserve.isra.0+0x40/0xf0 [ 700.023957] __alloc_skb+0x10b/0x5f0 [ 700.023970] ? skb_scrub_packet+0x490/0x490 [ 700.023990] ? lockdep_hardirqs_on+0x415/0x5d0 [ 700.033235] ? trace_hardirqs_on+0x67/0x220 [ 700.033256] tc_chain_notify+0xcf/0x200 [ 700.033277] __tcf_chain_put+0x380/0x500 [ 700.033296] tc_new_tfilter+0xdae/0x1790 [ 700.033322] ? tc_del_tfilter+0xe60/0xe60 [ 700.033340] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 700.033352] ? kfree_skbmem+0xcb/0x150 [ 700.033371] ? mutex_trylock+0x1e0/0x1e0 [ 700.033410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.033425] ? tc_del_tfilter+0xe60/0xe60 [ 700.033439] rtnetlink_rcv_msg+0x463/0xb00 [ 700.033456] ? rtnetlink_put_metrics+0x560/0x560 [ 700.041468] ? netdev_pick_tx+0x300/0x300 [ 700.041488] ? netlink_deliver_tap+0x22d/0xc20 [ 700.041507] ? find_held_lock+0x35/0x130 [ 700.041526] netlink_rcv_skb+0x17d/0x460 [ 700.041542] ? rtnetlink_put_metrics+0x560/0x560 [ 700.041559] ? netlink_ack+0xb30/0xb30 [ 700.041574] ? kasan_check_read+0x11/0x20 [ 700.041595] ? netlink_deliver_tap+0x254/0xc20 [ 700.041616] rtnetlink_rcv+0x1d/0x30 [ 700.041630] netlink_unicast+0x537/0x720 [ 700.041650] ? netlink_attachskb+0x770/0x770 [ 700.041671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.047474] loop4: p4 size 32768 extends beyond EOD, [ 700.050587] netlink_sendmsg+0x8ae/0xd70 [ 700.050611] ? netlink_unicast+0x720/0x720 [ 700.050633] ? selinux_socket_sendmsg+0x36/0x40 [ 700.050650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.050665] ? security_socket_sendmsg+0x8d/0xc0 [ 700.050678] ? netlink_unicast+0x720/0x720 [ 700.050693] sock_sendmsg+0xd7/0x130 [ 700.050708] ___sys_sendmsg+0x3e2/0x920 [ 700.050726] ? copy_msghdr_from_user+0x430/0x430 [ 700.050746] ? lock_downgrade+0x880/0x880 [ 700.050765] ? kasan_check_read+0x11/0x20 [ 700.056248] truncated [ 700.060615] ? __fget+0x367/0x540 [ 700.060635] ? iterate_fd+0x360/0x360 [ 700.060651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.060664] ? proc_fail_nth_write+0x9d/0x1e0 [ 700.060683] ? __fget_light+0x1a9/0x230 [ 700.060699] ? __fdget+0x1b/0x20 [ 700.060714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.060728] ? sockfd_lookup_light+0xcb/0x180 [ 700.060746] __sys_sendmmsg+0x1bf/0x4e0 [ 700.060766] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 700.060784] ? kasan_check_write+0x14/0x20 [ 700.060813] ? __sb_end_write+0xd9/0x110 [ 700.060830] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.060846] ? fput+0x128/0x1a0 [ 700.068891] ? ksys_write+0x1f1/0x2d0 [ 700.068914] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.068927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.068940] ? do_syscall_64+0x26/0x620 [ 700.068957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.068977] ? do_syscall_64+0x26/0x620 [ 700.068998] __x64_sys_sendmmsg+0x9d/0x100 [ 700.069018] do_syscall_64+0xfd/0x620 [ 700.069037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.069049] RIP: 0033:0x459a29 [ 700.069066] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.069074] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 700.069090] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 700.069098] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 700.069107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.069115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 700.069123] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 700.412969] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 700.421471] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:29 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010502cb0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes256, 0x3, "6514818d4d75fa34"}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1f30}]) 19:46:29 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:29 executing program 0 (fault-call:9 fault-nth:20): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r2, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000240), &(0x7f0000000280)=0x4) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r6) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000002c0)={[], 0x2, 0x0, 0x3ff, 0x21d0, 0x3, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r5, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:29 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4305]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 700.603622] FAULT_INJECTION: forcing a failure. [ 700.603622] name failslab, interval 1, probability 0, space 0, times 0 19:46:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000000)={0x80000001, 0x20001000, 0xffffffffffffffff, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x50000, 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 700.667246] CPU: 0 PID: 14492 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 700.674238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.683614] Call Trace: [ 700.686234] dump_stack+0x172/0x1f0 [ 700.689888] should_fail.cold+0xa/0x1b [ 700.693800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.698929] ? lock_downgrade+0x880/0x880 [ 700.703111] __should_failslab+0x121/0x190 [ 700.707376] should_failslab+0x9/0x14 [ 700.711203] kmem_cache_alloc_node+0x26c/0x710 19:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x202a}]) [ 700.715803] ? netdev_run_todo+0x559/0x7a0 [ 700.715828] __alloc_skb+0xd5/0x5f0 [ 700.715845] ? skb_scrub_packet+0x490/0x490 [ 700.715864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.715879] ? tc_del_tfilter+0xe60/0xe60 [ 700.715897] netlink_ack+0x25c/0xb30 [ 700.723771] ? netlink_sendmsg+0xd70/0xd70 [ 700.723787] ? netlink_deliver_tap+0x22d/0xc20 [ 700.723806] ? find_held_lock+0x35/0x130 [ 700.723826] netlink_rcv_skb+0x382/0x460 [ 700.723842] ? rtnetlink_put_metrics+0x560/0x560 [ 700.723859] ? netlink_ack+0xb30/0xb30 [ 700.723877] ? kasan_check_read+0x11/0x20 [ 700.723898] ? netlink_deliver_tap+0x254/0xc20 [ 700.723916] rtnetlink_rcv+0x1d/0x30 [ 700.767184] netlink_unicast+0x537/0x720 [ 700.767206] ? netlink_attachskb+0x770/0x770 [ 700.767229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.775948] netlink_sendmsg+0x8ae/0xd70 [ 700.775970] ? netlink_unicast+0x720/0x720 [ 700.775994] ? selinux_socket_sendmsg+0x36/0x40 [ 700.776010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.776024] ? security_socket_sendmsg+0x8d/0xc0 [ 700.776038] ? netlink_unicast+0x720/0x720 [ 700.776056] sock_sendmsg+0xd7/0x130 [ 700.776073] ___sys_sendmsg+0x3e2/0x920 [ 700.776091] ? copy_msghdr_from_user+0x430/0x430 [ 700.776112] ? lock_downgrade+0x880/0x880 [ 700.776132] ? kasan_check_read+0x11/0x20 [ 700.776151] ? __fget+0x367/0x540 [ 700.776168] ? iterate_fd+0x360/0x360 [ 700.849266] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.854837] ? proc_fail_nth_write+0x9d/0x1e0 [ 700.859362] ? __fget_light+0x1a9/0x230 [ 700.863361] ? __fdget+0x1b/0x20 [ 700.866746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.872316] ? sockfd_lookup_light+0xcb/0x180 [ 700.876836] __sys_sendmmsg+0x1bf/0x4e0 [ 700.880835] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 700.885185] ? kasan_check_write+0x14/0x20 [ 700.889452] ? __sb_end_write+0xd9/0x110 [ 700.893535] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.899101] ? fput+0x128/0x1a0 [ 700.902398] ? ksys_write+0x1f1/0x2d0 [ 700.906214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.906231] ? trace_hardirqs_on_thunk+0x1a/0x1c 19:46:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x3}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x1ab764c12cd3d144}}, 0xe8) close(r0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r2) r3 = dup3(r1, r2, 0xc0000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100)={0x9}, 0x4) syncfs(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000200)={0x8, 0x0, [{0xc0000001, 0x1ff, 0x4, 0x0, 0x3, 0x8, 0x3}, {0x7, 0x6, 0x6, 0x9, 0x9, 0xf3c, 0x9}, {0x7, 0x101, 0x0, 0x0, 0x9, 0x7f}, {0x40000000, 0x0, 0x4, 0x8, 0x8, 0x0, 0x5}, {0xa, 0x1, 0x4, 0x0, 0x5, 0x0, 0x800}, {0xc0000000, 0x240, 0x4, 0x9, 0x7fc00000, 0x3, 0x9}, {0x80000019, 0x4, 0x4, 0x6, 0x4cf, 0x984, 0x4}, {0xc0000001, 0x7, 0x4, 0xd7f8, 0xfff, 0x4, 0x1ff}]}) [ 700.906247] ? do_syscall_64+0x26/0x620 [ 700.906263] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.906284] ? do_syscall_64+0x26/0x620 [ 700.906306] __x64_sys_sendmmsg+0x9d/0x100 [ 700.906326] do_syscall_64+0xfd/0x620 [ 700.919810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.919823] RIP: 0033:0x459a29 [ 700.919836] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:46:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000240)={{0xa, 0x4e22, 0xdc, @empty, 0x101}, {0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x7f}, 0x8, [0x9, 0x20, 0x2, 0x9, 0x9, 0xb2, 0xffff, 0x80]}, 0x5c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 700.919843] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 700.919858] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 700.919866] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 700.919875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.919882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 700.919894] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:29 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4788]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 701.254340] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 701.258910] loop4: partition table partially beyond EOD, truncated [ 701.284570] loop4: p1 start 1 is beyond EOD, truncated [ 701.295276] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 701.303101] loop4: p3 size 2 extends beyond EOD, truncated [ 701.315235] loop4: p4 size 32768 extends beyond EOD, truncated [ 701.335251] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 701.343059] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:30 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010503fa0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x20d0}]) 19:46:30 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4888]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:30 executing program 0 (fault-call:9 fault-nth:21): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000280)=@usbdevfs_driver={0x65aa, 0xed2, &(0x7f0000000240)="34e851258624dbf5da1e0c6911"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 701.607208] FAULT_INJECTION: forcing a failure. [ 701.607208] name failslab, interval 1, probability 0, space 0, times 0 19:46:30 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x24a8}]) 19:46:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/seq6encer\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) sendfile(r1, r2, 0x0, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x7}, 0x8) [ 701.648951] CPU: 0 PID: 14751 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 701.655931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.655938] Call Trace: [ 701.655960] dump_stack+0x172/0x1f0 [ 701.655990] should_fail.cold+0xa/0x1b [ 701.675474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 701.680603] ? lock_downgrade+0x880/0x880 [ 701.684873] __should_failslab+0x121/0x190 [ 701.689134] should_failslab+0x9/0x14 [ 701.692959] kmem_cache_alloc_node+0x26c/0x710 [ 701.697557] ? netdev_run_todo+0x559/0x7a0 [ 701.701821] __alloc_skb+0xd5/0x5f0 [ 701.705473] ? skb_scrub_packet+0x490/0x490 [ 701.709823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.715374] ? tc_del_tfilter+0xe60/0xe60 [ 701.715396] netlink_ack+0x25c/0xb30 [ 701.715421] ? netlink_sendmsg+0xd70/0xd70 [ 701.715438] ? netlink_deliver_tap+0x22d/0xc20 [ 701.715456] ? find_held_lock+0x35/0x130 [ 701.715475] netlink_rcv_skb+0x382/0x460 [ 701.715493] ? rtnetlink_put_metrics+0x560/0x560 [ 701.715508] ? netlink_ack+0xb30/0xb30 [ 701.715525] ? kasan_check_read+0x11/0x20 [ 701.715547] ? netlink_deliver_tap+0x254/0xc20 [ 701.715568] rtnetlink_rcv+0x1d/0x30 [ 701.715582] netlink_unicast+0x537/0x720 [ 701.715602] ? netlink_attachskb+0x770/0x770 [ 701.715621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.715638] netlink_sendmsg+0x8ae/0xd70 [ 701.761521] ? netlink_unicast+0x720/0x720 [ 701.761546] ? selinux_socket_sendmsg+0x36/0x40 [ 701.761563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.761579] ? security_socket_sendmsg+0x8d/0xc0 [ 701.775571] ? netlink_unicast+0x720/0x720 [ 701.775590] sock_sendmsg+0xd7/0x130 [ 701.775607] ___sys_sendmsg+0x3e2/0x920 [ 701.775626] ? copy_msghdr_from_user+0x430/0x430 [ 701.775648] ? lock_downgrade+0x880/0x880 [ 701.775668] ? kasan_check_read+0x11/0x20 [ 701.775688] ? __fget+0x367/0x540 [ 701.775708] ? iterate_fd+0x360/0x360 [ 701.775728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 701.775741] ? proc_fail_nth_write+0x9d/0x1e0 [ 701.775758] ? __fget_light+0x1a9/0x230 [ 701.803290] ? __fdget+0x1b/0x20 19:46:30 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6488]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r0, 0x1, [], r2, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000000c0)) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r3, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r4, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 701.803310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.803326] ? sockfd_lookup_light+0xcb/0x180 [ 701.803345] __sys_sendmmsg+0x1bf/0x4e0 [ 701.803367] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 701.803386] ? kasan_check_write+0x14/0x20 [ 701.803422] ? __sb_end_write+0xd9/0x110 [ 701.815881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 701.815899] ? fput+0x128/0x1a0 [ 701.815914] ? ksys_write+0x1f1/0x2d0 [ 701.815936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 701.815952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 701.815967] ? do_syscall_64+0x26/0x620 [ 701.815985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.815999] ? do_syscall_64+0x26/0x620 [ 701.816021] __x64_sys_sendmmsg+0x9d/0x100 [ 701.816040] do_syscall_64+0xfd/0x620 [ 701.816059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.816072] RIP: 0033:0x459a29 [ 701.816087] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.816096] RSP: 002b:00007f7f93e18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 701.816112] RAX: ffffffffffffffda RBX: 00007f7f93e18c90 RCX: 0000000000459a29 [ 701.816119] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 701.816130] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 701.919806] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f93e196d4 [ 701.919816] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:46:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000000)={0x1, 0x2d, 0x5}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 702.077257] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 702.095643] loop4: partition table partially beyond EOD, truncated [ 702.154491] loop4: p1 start 1 is beyond EOD, truncated [ 702.177961] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 702.196191] loop4: p3 size 2 extends beyond EOD, truncated [ 702.214298] loop4: p4 size 32768 extends beyond EOD, truncated [ 702.223225] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 702.246687] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:31 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050fff0001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2648}]) 19:46:31 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x800e]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:31 executing program 0 (fault-call:9 fault-nth:22): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 19:46:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000280)={'rose0\x00', {0x2, 0x4e20, @loopback}}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0x5, 0x7, 0x0, r2, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x81, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f0000000000000000000000000000000000160000000000000000000000faffffff00"/92]}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r6 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r6) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) write$P9_RSTATu(r5, &(0x7f00000007c0)={0x1aa, 0x7d, 0x0, {{0x500, 0x18b, 0x0, 0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH', 0xfffffdde, '\xe8posix_acl_access'}, 0xfffffffffffffc26, '/dev/nbd#\x00', r7}}, 0x1aa) r8 = socket$inet(0x2, 0x3, 0x19) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x100) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x23, &(0x7f0000000000)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x20}, {0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x4a0ed6d7, 0x5, 0xffffffffffffffff}, {0x0, 0x100000000000}, 0x0, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xffffffae) setsockopt$inet_msfilter(r8, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r10 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r10, &(0x7f0000000480), 0x10000000000000f2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r9, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f00000002c0)=0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r8, 0x660c) 19:46:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x6, 0x287, 0x1ff}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:31 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8035]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x283c}]) 19:46:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:46:31 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8100]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x10, 0x4, 0x1}, 0x1b2b5431}}, 0x18) [ 702.911085] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 702.915940] loop4: partition table partially beyond EOD, truncated [ 702.930002] loop4: p1 start 1 is beyond EOD, truncated [ 702.970316] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 703.059749] loop4: p3 size 2 extends beyond EOD, truncated [ 703.085336] loop4: p4 size 32768 extends beyond EOD, truncated [ 703.122778] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 703.143485] loop4: p6 size 32768 extends beyond EOD, truncated [ 703.251443] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 703.256019] loop4: partition table partially beyond EOD, truncated [ 703.276164] loop4: p1 start 1 is beyond EOD, truncated [ 703.285284] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 703.294810] loop4: p3 size 2 extends beyond EOD, truncated [ 703.305534] loop4: p4 size 32768 extends beyond EOD, truncated [ 703.313688] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 703.323820] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:31 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000002000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:31 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8847]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7ff, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2a20}]) 19:46:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2) 19:46:32 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8848]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:32 executing program 3: r0 = epoll_create(0x9) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0xff}, 0x28, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x40, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x48000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100), 0x4) 19:46:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2bc0}]) 19:46:32 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3) 19:46:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/de\x1eP9\xf6\xa5R\x81\x83\x00\x04\b\x00', 0x0, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000100)={0x1, 0x1, 0x8da}) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4000, 0x0) 19:46:32 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8864]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 703.791655] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 703.796511] loop4: partition table partially beyond EOD, truncated [ 703.840161] loop4: p1 start 2 is beyond EOD, truncated [ 703.873625] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 703.909909] loop4: p3 size 2 extends beyond EOD, truncated [ 703.950168] loop4: p4 size 32768 extends beyond EOD, truncated [ 703.980231] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 704.024572] loop4: p6 size 32768 extends beyond EOD, truncated [ 704.221693] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 704.226947] loop4: partition table partially beyond EOD, truncated [ 704.233939] loop4: p1 start 2 is beyond EOD, truncated [ 704.239277] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 704.273499] loop4: p3 size 2 extends beyond EOD, truncated [ 704.284505] loop4: p4 size 32768 extends beyond EOD, truncated [ 704.293033] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 704.301561] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:32 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000003000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:32 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0xffff5d0f}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2c00}]) 19:46:32 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4) 19:46:32 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8906]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:32 executing program 3: arch_prctl$ARCH_SET_GS(0x1001, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x40100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={r2, 0x10, "c2dd949b9491f4fc2d14cb35cd1256f9"}, &(0x7f0000000140)=0x18) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x61, 0x44e03) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001240)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0x1, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:33 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2f98}]) 19:46:33 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000400)='/dev/vbi#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket(0x10, 0x8000000803, 0x0) write(r2, &(0x7f0000000000)="220000002000070700be0000090007010200000000000000002000000500", 0x1e) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) r3 = open(&(0x7f0000000100)='./file1\x00', 0x48c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x20af80, 0x3c) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x7fffffa7) readahead(r3, 0xfffffffffffffe00, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffb9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r5, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000200)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240), 0xfffffffffffffe69) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r7, 0x40047459, &(0x7f0000000240)=""/174) pread64(r7, 0x0, 0xd2, 0x0) write$binfmt_elf64(r7, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0x7, 0x7, 0x1f}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000000c0)={r6, 0x1, 0x6, @broadcast}, 0x10) 19:46:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5) 19:46:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0xfffe}, {0x829a}, {0x0, 0x0, 0x0, 0x20000000000000}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) fcntl$setflags(r0, 0x2, 0x1) r1 = getpid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x100001) tkill(r2, 0x1e) r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x9, &(0x7f0000000100)={0x9, 0x20000000}) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r4) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r5) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000280)={r6, 0x1ff}, &(0x7f00000002c0)=0x8) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f00"/92]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r7, &(0x7f0000000400)=ANY=[@ANYBLOB="befeffff7d00000005fa000000000000000000000000000000000000000000000000000000000000000004000000000000001f00046e6f64657673656c66776d643573756d5b76626f786e657430707070302517007070703170726f63766d6e657431dd29776c616e302b5d91006367726f757070707031285c183f82751aacf2de8cca2560c6fb302e25903ec34b647d44210b25bfc20dc5e8a02a2df85b52f46d9334b7af1300e8b57db45087c06eedb2cd8448b0682801bff8c8fae1a18540ac3258e43027544a83b3f2c812663635660444fcfcb27de4bfa0a3902f829172c0cc08ffdfdacc37a46e404f33bdb14145a1d6218d178ba3b3f0bdb7554800000a002f6465762f6e62642300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x301f}]) [ 704.782702] audit: type=1800 audit(1570045593.338:290): pid=15482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=17227 res=0 [ 704.906541] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 704.939359] loop4: partition table partially beyond EOD, truncated [ 704.977808] loop4: p1 start 3 is beyond EOD, truncated [ 705.013732] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 705.046726] loop4: p3 size 2 extends beyond EOD, truncated [ 705.055714] loop4: p4 size 32768 extends beyond EOD, truncated [ 705.069745] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 705.078168] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:33 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000004000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:33 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xff00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000002600)='/dev/full\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000002680)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000002740)={&(0x7f0000002640)={0x10, 0x0, 0x0, 0x21000010}, 0xc, &(0x7f0000002700)={&(0x7f00000026c0)={0x1c, r2, 0x20, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0xc7d506bedd5ff9c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6) 19:46:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3138}]) 19:46:34 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf0ffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3300}]) [ 705.621454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3613 sclass=netlink_route_socket pig=15492 comm=syz-executor.3 19:46:34 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8) [ 705.720697] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 705.752467] loop4: partition table partially beyond EOD, truncated [ 705.787858] loop4: p1 start 4 is beyond EOD, truncated 19:46:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x365f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:34 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000000000000000fc00000000000000000000000000000000000000000000000000ed22716a9058f874000000000000000000000000000040000000"]}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r1) write$evdev(r1, &(0x7f00000000c0)=[{{0x0, 0x2710}, 0x2, 0x8000, 0x1000}], 0x18) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="befeffff7d00000005fa000000000000000000000000000000000000000000000000000000000000000000000000000000001f00046e6f64657673656c66776d643573756d5b76626f786e657430707070302517007070703170726f63766d6e657431dd29776c616e302b5d91006367726f757070707031285c183f82751aacf2de8cca2560c6fb302e25903ec34b647d44210b25bfc20dc5e8a02a2df85b52f46d9346b7af1300e8b57db45087c06eedb2c8fae1a18540ac3258e43027544a83b3f2c812663635660444fcfcb27de5bfe6916b8f829172c0cc08ffdfdacc37a46e404f33bdb14145a1d6218d178ba3b3f0bdb7554800000a002f6465762f6e62642300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) [ 705.806384] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 705.830470] loop4: p3 size 2 extends beyond EOD, truncated 19:46:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3510}]) [ 705.863767] loop4: p4 size 32768 extends beyond EOD, truncated [ 705.915969] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 705.955437] loop4: p6 size 32768 extends beyond EOD, truncated [ 706.284785] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 706.289372] loop4: partition table partially beyond EOD, truncated [ 706.296294] loop4: p1 start 4 is beyond EOD, truncated [ 706.302433] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 706.309665] loop4: p3 size 2 extends beyond EOD, truncated [ 706.316517] loop4: p4 size 32768 extends beyond EOD, truncated [ 706.323542] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 706.330880] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:34 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000006000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:34 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x80000, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000000c0)=""/175) fchdir(r0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x5, 0x1) 19:46:34 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9) 19:46:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x36b0}]) 19:46:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:35 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3663, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80002, 0x9}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x400, 0x38500) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)=0x9, 0x4) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000100)={0x1000, 0xbf, 0x5, 0xc0, 0x2, 0x5, 0x22, "b4e8643349cb0c83e9211e90663ceff550cbf27f", "d2e383c936c23ce799b298df73f7a4f4ca097d61"}) 19:46:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3831}]) 19:46:35 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa) 19:46:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:35 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x5000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 706.875373] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 706.913131] loop4: partition table partially beyond EOD, truncated [ 706.967230] loop4: p1 start 6 is beyond EOD, truncated [ 706.983515] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 707.028070] loop4: p3 size 2 extends beyond EOD, truncated [ 707.056133] loop4: p4 size 32768 extends beyond EOD, truncated [ 707.080604] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 707.111797] loop4: p6 size 32768 extends beyond EOD, truncated [ 707.311465] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 707.316107] loop4: partition table partially beyond EOD, truncated [ 707.322898] loop4: p1 start 6 is beyond EOD, truncated [ 707.329057] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 707.337146] loop4: p3 size 2 extends beyond EOD, truncated [ 707.343923] loop4: p4 size 32768 extends beyond EOD, truncated [ 707.352994] loop4: p5 size 1073741824 extends beyond EOD, truncated 19:46:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3a88}]) 19:46:35 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000007000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:35 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:35 executing program 3: ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet(0x2, 0x3, 0x19) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r2) sendto$inet6(r2, &(0x7f0000000280)="f4f47a167b26871bff7fb377fa6bf4c35b2020e906516a6aeefcb619083e3f52ded018b826f591fb854b82a47fc498f639346bba5157f4754d9296d0dfd10fa1c8f56a557cf9cc6b730036288a518451971270b4f5a1ee88f02c0f55f7f0891b446a8c1fcbfd6c67d1f102507e23b63ee95ad7a6359d9b83db851c9c2105b168ae21adfd2d1b377045f60c1a1ef771cb4e9709004268fe9580e6ea79fa812705008a8d2a9328b9906fcd31e2042f8db697298a02cbe87385c4b2549110330f70c42fd6d4eba117db85f5ff094fc7fd4344ba44766812eb824b9c23469eebc440ffbe4214", 0xe4, 0x0, &(0x7f0000000380)={0xa, 0x4e24, 0xb7, @mcast2, 0x6}, 0x1c) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x4e21}, {0x0, 0x0, 0x4000000000000}, {0x0, 0x0, 0xfffffffffffffffe}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000240)='erspan0\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac14443d3ce7c1e9aa2d0000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0d80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @identifier="4011a0a2c30ad2d8d6ec2fcb6a9e3c5c"}}) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r4 = dup2(r3, 0xffffffffffffffff) ioctl$VIDIOC_G_CROP(r4, 0xc014563b, &(0x7f0000000140)={0x1, {0x101, 0x13, 0x8, 0x3}}) 19:46:35 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb) 19:46:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0x119, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {0x68}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 707.361162] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:36 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x7000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:36 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc) 19:46:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getsockname$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT(r2, 0x4068aea3, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3b00}]) 19:46:36 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 707.947670] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:36 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8060000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 707.982862] loop4: partition table partially beyond EOD, truncated 19:46:36 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe) 19:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3c00}]) [ 708.117407] loop4: p1 start 7 is beyond EOD, truncated [ 708.154280] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 708.162682] loop4: p3 size 2 extends beyond EOD, truncated [ 708.225365] loop4: p4 size 32768 extends beyond EOD, truncated [ 708.264603] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 708.294466] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:37 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000008000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:37 executing program 2: getgid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x7, 0x7, 0x6, 0x1}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000280)={&(0x7f0000000240)=[0x2, 0x946, 0x3ff, 0x71800000], 0x4, 0x40, 0x3, 0x2, 0x8, 0x3, {0x6, 0x2, 0x0, 0x20, 0x1ff, 0x38d, 0x5, 0x0, 0x400, 0x5, 0x20, 0x2, 0x0, 0x0, "35f22bf85d4d3b738586501a3351b1c4a5a06f55399e70b26cb2f130d7b9369e"}}) 19:46:37 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xa000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:37 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf) 19:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3c28}]) [ 708.547902] audit: type=1800 audit(1570045597.098:291): pid=16341 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17260 res=0 19:46:37 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xd000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3f00}]) 19:46:37 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x10) [ 708.756702] audit: type=1804 audit(1570045597.138:292): pid=16341 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/909/file0" dev="sda1" ino=17260 res=1 [ 708.961492] audit: type=1800 audit(1570045597.148:293): pid=16341 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17260 res=0 19:46:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f0000000000000020000000000000000015000000000000008858432a772541874b980000000000000000000000ffff000000000000000000000000000000ff000000000000000000000000000000c18d674aa617d4235eccda172b4606016901a120bbfe2d582dd167e683d1cd9a89e46714a9bb3ae5b88b12e636427dffb64117bc68"]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:37 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x20000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 709.060274] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 709.065038] loop4: partition table partially beyond EOD, truncated 19:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4000}]) [ 709.151965] loop4: p1 start 8 is beyond EOD, truncated [ 709.183183] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 709.238624] loop4: p3 size 2 extends beyond EOD, truncated [ 709.279874] loop4: p4 size 32768 extends beyond EOD, truncated [ 709.291310] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 709.302151] loop4: p6 size 32768 extends beyond EOD, truncated [ 709.352502] audit: type=1804 audit(1570045597.908:294): pid=16526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/909/file0" dev="sda1" ino=17260 res=1 [ 709.385504] audit: type=1800 audit(1570045597.938:295): pid=16526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17260 res=0 19:46:38 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000000a000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:38 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x14) 19:46:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x28000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4014}]) 19:46:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3c000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) write(0xffffffffffffffff, &(0x7f0000000800)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9f9fd5da4ddad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634120f46680e8128309c20a60c354e945de24a66d71b33fdb27b6b8def4dc4c65f6fc96b01587f22e42dcc5663c0f96abc7c788170c37317dfd42fd34b53be07445e8dc8aec6411570a53a93e7be9ba7967613a94896feda897fb03c9cb3c1ab34f3b5b7f70769335ea29d8132e23debe5f7708cf1a864f94a8669e966d335360a30", 0xffffffb7) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x8, 0x800, 0x1, 0x4, 0x3f, 0x1, 0x7, 0x0, 0x800, 0x20, 0x7fffffff, 0x2, 0x2, 0x1000, 0x12, 0x1}}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000040)="b486c2c437b3d4b3"}) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000300)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e, 0x80400) r8 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r8) r9 = getuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r11, 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r8, &(0x7f0000000600)='system.posix_acl_access\x00', &(0x7f0000000dc0)=ANY=[@ANYBLOB="02000000010002000000000002000400", @ANYRES32=r4, @ANYBLOB="02000100ecb9fbd69884d5cb9cf0630cc0f31d4ebf05420b1ae041100366b5aa7f9ed74f831366e5493d774428d24bd5fe90e8c938322f513e13324ef7a50e04fb1617d897d0fd69bb1b0f3c171809d6cf70570f0d2ab77c98cdde57d9c182840713d65ad96cdeb722e3f5ff4f9ee896f34fdc0a120d02d546bb551955e045c0b7303b0b216f088696c2", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="040004000000000008000a00", @ANYRES32=r12, @ANYBLOB="1000000000"], 0x44, 0x0) r13 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc000, 0x0) fsetxattr$security_evm(r13, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="530203000000007c00b7ffa0807d0a9a11623c2c3b8fe638e7030b5e5585199959d9d33fac5343a80b0e42274b1a083563d126000fa4719810892a7c995cdd190b447b3b4564fd1adaafa163fa383e168b050a0efb029d308cc4134fb97a97da86e955aa614fdf97cf45ff9255fa65129524df4c55a9f559564ea900a1ddf89b29c3a923e92842d8a101a285b61a0b1dd535e601a8ea7eadaa9c7a9e8f78b9f8d62f46afc24a77495ba385350dac670be6d481f7a737049e28092057f700000000"], 0xc1, 0x2) 19:46:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e24, 0x6, @mcast1, 0x80}, {0xa, 0x4e23, 0x5, @rand_addr="f8913798fa8e85a7b574a3df90cfcb07", 0x1f}, 0xffff, [0x4, 0xd5, 0x1c4e390b, 0x0, 0x8000, 0x800, 0x7, 0x5]}, 0x5c) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f00"/92]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4826}]) [ 709.699442] audit: type=1800 audit(1570045598.248:296): pid=16610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17256 res=0 [ 709.794828] audit: type=1804 audit(1570045598.298:297): pid=16610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/910/file0" dev="sda1" ino=17256 res=1 19:46:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x40000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:38 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x60) [ 709.920708] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 709.929744] loop4: partition table partially beyond EOD, truncated [ 710.005372] loop4: p1 start 10 is beyond EOD, truncated 19:46:38 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, r0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r3 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) getsockopt$inet_mreqn(r3, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r3) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000080)=0x1, &(0x7f0000000140)=0x4) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000002c0)=0xe8) r6 = openat$cgroup_subtree(r5, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) ftruncate(r6, 0x1) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0xff, 0x8}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='\x95$ev/se1uEnc\xcc\x00', 0x0, 0x0) 19:46:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x43050000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 710.060882] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 710.104427] loop4: p3 size 2 extends beyond EOD, truncated [ 710.105166] audit: type=1800 audit(1570045598.298:298): pid=16610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17256 res=0 [ 710.157187] loop4: p4 size 32768 extends beyond EOD, truncated [ 710.179431] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 710.208723] loop4: p6 size 32768 extends beyond EOD, truncated [ 710.227455] audit: type=1800 audit(1570045598.388:299): pid=16624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17256 res=0 19:46:38 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000000f000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x5009}]) 19:46:38 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x60000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r3) keyctl$unlink(0x9, r2, r3) keyctl$instantiate(0xc, r2, &(0x7f00000003c0)=@encrypted_update={'update ', 'default', 0x20, 'user:'}, 0x15, 0xffffffffffffffff) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81023c7}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r5 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f00000002c0)=""/249) write$P9_RSTATu(r4, &(0x7f0000000400)={0x101, 0x7d, 0x0, {{0x500, 0xe2, 0x0, 0x0, {0x23}, 0x1000000, 0x0, 0x0, 0x0, 0x7, 'default', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x101) 19:46:38 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc0) 19:46:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0xec) r1 = socket$inet(0x2b, 0x801, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x46082, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000100)={0x1, 'netdevsim0\x00', 0x4}, 0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r4, 0x8}, &(0x7f0000000080)=0xc) prctl$PR_SET_SECUREBITS(0x1c, 0x38) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x800e0000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x581b}]) 19:46:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x80350000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) setsockopt$packet_int(r0, 0x107, 0x3, &(0x7f00000003c0)=0x7, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getresuid(&(0x7f00000000c0), &(0x7f0000000340), &(0x7f0000000380)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004693c3b0e86bc054d114c5c018365dc0eb514525f57d19278212f945b3a061ea9a5fdece37e715fab62ec7253c95c9ff057ad994f8c87e00c209d1775b44bc9ca042c7562096f5d2141035542e33df5b44383f1bd876b2ef211b8fc5e4f7247224422f24ea01376d71d0df1ee2474631b1c4f6ce2b43181d8c865f774043925f9a"]}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x20500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21f22}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4050008c416cf2347174fe0a499a98b45b356dc595e0a1ea74d27b9b91369c1a9f37fbb3738abbce3c78577075e3300"/83], 0x18) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x7fff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000004c0)={@rand_addr=0x5, @loopback, r3}, 0xc) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 710.721452] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 710.732849] loop4: partition table partially beyond EOD, truncated 19:46:39 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0) [ 710.779993] loop4: p1 start 15 is beyond EOD, truncated [ 710.805816] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 710.848751] loop4: p3 size 2 extends beyond EOD, truncated [ 710.877165] loop4: p4 size 32768 extends beyond EOD, truncated [ 710.916887] audit: type=1800 audit(1570045599.468:300): pid=16921 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17025 res=0 [ 710.949941] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 710.985630] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:39 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000014000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x81000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:39 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x2, 0x0, &(0x7f0000ffa000/0x3000)=nil}) 19:46:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6000}]) 19:46:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x0, 0xffffffff, 0xffffffff}) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x2, &(0x7f00000000c0)=[{0x2, 0x81, 0x3f, 0x1f}, {0x40, 0x4, 0x80, 0x100}]}) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:39 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x300) 19:46:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x86ddffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100}, 0x22400}, 0x0, 0x0, r0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6810}]) 19:46:40 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x331) 19:46:40 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88470000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 711.535082] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 711.554166] loop4: partition table partially beyond EOD, truncated 19:46:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) signalfd(r0, &(0x7f0000000000)={0x5}, 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 711.599514] loop4: p1 start 20 is beyond EOD, truncated [ 711.649954] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 711.699452] loop4: p3 size 2 extends beyond EOD, truncated [ 711.720671] loop4: p4 size 32768 extends beyond EOD, truncated [ 711.749127] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 711.769184] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:40 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000001d000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7605}]) 19:46:40 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88480000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:40 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x2, 0xffffffff, [], &(0x7f0000000080)=0x5}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 712.116953] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 712.130794] loop4: partition table partially beyond EOD, truncated [ 712.144448] loop4: p1 start 29 is beyond EOD, truncated [ 712.171628] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 712.178929] loop4: p3 size 2 extends beyond EOD, truncated [ 712.186203] loop4: p4 size 32768 extends beyond EOD, truncated [ 712.193363] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 712.200767] loop4: p6 size 32768 extends beyond EOD, truncated [ 712.322091] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 712.340365] loop4: partition table partially beyond EOD, truncated [ 712.358820] loop4: p1 start 29 is beyond EOD, truncated [ 712.365399] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 712.373593] loop4: p3 size 2 extends beyond EOD, truncated [ 712.381254] loop4: p4 size 32768 extends beyond EOD, truncated [ 712.388110] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 712.395742] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:42 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88640000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:42 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x500) 19:46:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7805}]) 19:46:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 19:46:42 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000001f000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0xb277, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x6, 0x9, 0x6}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) lstat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000540)={0x3, 0x6}) write$P9_RSTATu(r4, &(0x7f0000000400)={0x119, 0x7d, 0x100, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0xcc, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00', r5}}, 0x119) 19:46:42 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88a8ffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x581002, 0x0) 19:46:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x883a}]) [ 714.484733] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x600) [ 714.513908] loop4: partition table partially beyond EOD, truncated [ 714.547583] loop4: p1 start 31 is beyond EOD, truncated 19:46:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88caffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 714.571215] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:46:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$binfmt_elf32(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1078) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 714.619410] loop4: p3 size 2 extends beyond EOD, truncated 19:46:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r2) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000000c0)=0x2, 0x4) 19:46:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x982f}]) [ 714.662996] loop4: p4 size 32768 extends beyond EOD, truncated [ 714.684487] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 714.706342] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x89060000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x900) 19:46:43 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000025000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xa07f290df430311e, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x105100, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) close(r2) fdatasync(r2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8}}, 0x9, 0x200, 0x200, 0x1, 0x80000001}, &(0x7f0000000140)=0x98) r5 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x230, 0x230, 0x370, 0x370, 0x370, 0x4, &(0x7f00000002c0), {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, {[0xff, 0xff, 0x0, 0x0, 0xff, 0x80]}, @mac=@broadcast, {[0x0, 0x181, 0x0, 0xff, 0x0, 0x1fe]}, 0x100, 0x6, 0x81, 0xfff, 0x7, 0x7, 'veth1\x00', 'ip6erspan0\x00', {0x7f}, {}, 0x0, 0x90}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @dev={0xac, 0x14, 0x14, 0x26}, 0x689d5978e9911418, 0xffffff00, @empty, {[0x0, 0x7f, 0x0, 0x998750120c3b6381, 0xff]}, @mac=@broadcast, {[0xff, 0xff, 0xff, 0x0, 0x0, 0x181]}, 0x8, 0x9, 0x0, 0x7, 0x1, 0x0, 'bridge_slave_0\x00', 'veth1_to_bond\x00', {0xff}, {}, 0x0, 0x2}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x4, 0x6}}}, {{@arp={@multicast1, @loopback, 0xff000000, 0xff000000, @empty, {[0x0, 0x0, 0x0, 0xff, 0x0, 0x1fe]}, @mac=@dev={[], 0x13}, {[0x0, 0x7f, 0x0, 0x7f]}, 0x9, 0x8000, 0x6, 0x7, 0x7, 0x4ee6, 'bcsf0\x00', 'hsr0\x00', {}, {0xff}, 0x0, 0x40}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) r6 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{@in=@multicast1}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x4}}, 0xe8) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$FICLONE(r6, 0x40049409, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0x100, 0x20, 0x4, 0x4}, &(0x7f00000001c0)=0x18) r7 = semget$private(0x0, 0x4, 0x69e4f64fa5ab7c43) semctl$IPC_RMID(r7, 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000280)={0x4, 0x7, 0x3, 0x0, 0x1, 0x4, 0x5, 0xc0, 0xe0, 0x4, 0x3f, 0x4, 0x0, 0x4, 0x80, 0x1, 0x0, 0x7f, 0x2}) 19:46:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8dffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa824}]) 19:46:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa00) 19:46:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf5ffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="44005003000000000000000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000300000030000100080001000a00000008000200000000000800040000000000140003007f00000100"/62], 0x44}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x174, r3, 0x52b, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe26d3a3}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xd72d}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x800}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x28090}, 0x220040a0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xcc9ecf0, 0xb0000) write$FUSE_IOCTL(r4, &(0x7f00000000c0)={0x20, 0x57f2a10572d8cb0e, 0x3, {0x51c8, 0x4, 0x1, 0x4}}, 0x20) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x6) 19:46:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xaa05}]) [ 715.374514] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 715.388453] loop4: partition table partially beyond EOD, truncated 19:46:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb00) [ 715.424848] loop4: p1 start 37 is beyond EOD, truncated 19:46:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000080)) [ 715.497598] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:46:44 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xff000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 715.610067] loop4: p3 size 2 extends beyond EOD, truncated [ 715.650223] loop4: p4 size 32768 extends beyond EOD, truncated [ 715.685564] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 715.705537] loop4: p6 size 32768 extends beyond EOD, truncated [ 715.820815] print_req_error: 32 callbacks suppressed [ 715.820825] print_req_error: I/O error, dev loop4, sector 0 [ 715.826610] print_req_error: I/O error, dev loop4, sector 0 [ 715.827126] print_req_error: I/O error, dev loop4, sector 0 [ 715.837423] print_req_error: I/O error, dev loop4, sector 0 [ 715.838672] buffer_io_error: 29 callbacks suppressed [ 715.838683] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 715.845610] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 715.845675] print_req_error: I/O error, dev loop4, sector 0 [ 715.848842] print_req_error: I/O error, dev loop4, sector 0 [ 715.852721] print_req_error: I/O error, dev loop4, sector 0 [ 715.856900] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 715.856952] print_req_error: I/O error, dev loop4, sector 0 [ 715.859885] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 715.864719] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 715.877586] print_req_error: I/O error, dev loop4, sector 0 [ 715.878124] print_req_error: I/O error, dev loop4, sector 0 [ 715.883616] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 715.889743] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 715.903257] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 715.952314] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 715.959960] Buffer I/O error on dev loop4p6, logical block 0, async page read 19:46:44 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000002c000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f00000000000000000000000000000000000000000000005ae1110feb4c5eec00000000000000000000000000000000000000000000000000009a0e9380db5b4c00000004000000000000bd72a905005fff74000000000000000000"]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb036}]) 19:46:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00) [ 716.009365] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) 19:46:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) accept4$unix(r1, &(0x7f0000000080), &(0x7f0000000000)=0x6e, 0x80000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:44 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffa888]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:44 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffca88]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:44 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x5a6001, 0x1cc) syslog(0x0, &(0x7f00000002c0)=""/4096, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000000)={0x200}, 0x3a5) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040), 0x4) socket(0x11, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f00000004c0)="d7fe15c1b673255e04c6bc15a6da85ac708c", 0x12, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x2, [0x7fffffff, 0x2a2d, 0x6, 0x9, 0x1, 0x20, 0x20, 0x40]}) 19:46:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb819}]) 19:46:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe00) [ 716.327733] audit: type=1800 audit(1570045604.868:301): pid=17704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17268 res=0 19:46:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:45 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffdd86]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 716.471491] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 716.480662] loop4: partition table partially beyond EOD, truncated [ 716.500201] loop4: p1 start 44 is beyond EOD, truncated [ 716.523312] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 716.540163] loop4: p3 size 2 extends beyond EOD, truncated [ 716.558081] loop4: p4 size 32768 extends beyond EOD, truncated [ 716.565538] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 716.573344] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:45 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000031000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:45 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xec0) 19:46:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc02b}]) 19:46:45 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xfffff000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:45 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffff8d]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:45 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf00) 19:46:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc80e}]) 19:46:45 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:45 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xfffffff5]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/devL\xd7\x85\xea+D#c\x04\x00', 0xff, 0x44000) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@md5={0x1, "bccb140fe059ca520cc57895a9716bc5"}, 0x11, 0x5) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) [ 717.307370] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:45 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1400) [ 717.364720] loop4: partition table partially beyond EOD, truncated [ 717.418816] loop4: p1 start 49 is beyond EOD, truncated [ 717.465446] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 717.492662] loop4: p3 size 2 extends beyond EOD, truncated [ 717.536093] loop4: p4 size 32768 extends beyond EOD, truncated [ 717.550465] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 717.565715] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:46 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000003a000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:46 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf0ffffffffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) alarm(0x2) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x2, 0xd976, [0x8, 0x1, 0x4, 0x1, 0x7ff], 0x101}) 19:46:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd020}]) 19:46:46 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3103) 19:46:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f000000000000000100000000000000000000fe000000000000000000000000000000000000000000000000001200000000000000000071d87fff00"/92]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f00000000000000000000000000000000000000000000000000faffffffffffffff00"/92]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:46 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x100000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x2, 0x3, 0x10}, {0x7f, 0x2, 0x7f, 0x9}, {0x7, 0x5f, 0x9b, 0x10001}, {0x1, 0x7, 0xc1, 0xffff}, {0x4, 0x2, 0x2c, 0x9}, {0x2, 0x1, 0x36, 0x8}, {0x800, 0x9, 0xff, 0x8001}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:46 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5865) 19:46:46 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x200000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd803}]) [ 718.100205] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 718.105371] loop4: partition table partially beyond EOD, truncated 19:46:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x81, 0x1, 0x80, 0xc, 0x0, 0x10000, 0x5e0a20b3f15d57b6, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x91bb255489dd4fdb, @perf_bp={&(0x7f00000000c0), 0x1}, 0x80, 0xffffffff, 0xffffffff, 0x4, 0x10000, 0x9, 0x1}, r1, 0xc, 0xffffffffffffffff, 0x8) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000058ea8c51b4794b6500000000"]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 718.141631] loop4: p1 start 58 is beyond EOD, truncated [ 718.197204] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 718.226608] loop4: p3 size 2 extends beyond EOD, truncated [ 718.282931] loop4: p4 size 32768 extends beyond EOD, truncated [ 718.297244] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 718.317310] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:47 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000003e000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6000) 19:46:47 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x300000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xe000}]) 19:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000200)={{0x18c001, 0xf000, 0x3, 0x4, 0x20, 0x8, 0x2, 0x4, 0x3, 0x8f, 0x4, 0x50}, {0x10000, 0x0, 0x9, 0xfe, 0x1f, 0x20, 0x4, 0x4d, 0x6, 0x20, 0xe6, 0x3f}, {0x1, 0x10000, 0x9, 0x4e, 0x5, 0x8, 0x47, 0x41, 0xc1, 0x8, 0xf5, 0x8}, {0xf801, 0x4, 0xe, 0x1, 0x0, 0x2, 0x1f, 0x8, 0x0, 0x3, 0x3, 0x8}, {0x4000, 0x3000, 0xc, 0x3f, 0x80, 0x2, 0x8, 0x40, 0xff, 0x3, 0x81, 0x5}, {0x6000, 0xa85d61a8df3e3480, 0xc, 0x5, 0x0, 0x80, 0x3, 0x20, 0x6, 0x5, 0x8, 0x5}, {0x11001, 0x2, 0x9, 0xab, 0x8, 0x1, 0x67, 0x0, 0x5, 0x2, 0x75, 0x2}, {0x100000, 0x0, 0xe, 0x40, 0x3f, 0xc0, 0x6, 0x5, 0x4, 0x0, 0x81, 0x6}, {0x10b800, 0x4}, {0x2000, 0x102004}, 0xa002003c, 0x0, 0x100000, 0x40000, 0x2, 0xc3c7e8c1a7a8b5f1, 0x4000, [0x40, 0x6]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x400) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000000)=""/200) semctl$IPC_INFO(r2, 0x2, 0x3, &(0x7f0000000000)=""/34) ioctl$UI_DEV_DESTROY(r1, 0x5502) 19:46:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000240)=0x4) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x101) 19:46:47 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x500000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xe015}]) 19:46:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff81, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x3, 0xffffffffffffffff, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6558) 19:46:47 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x600000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 718.754299] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 718.758972] loop4: partition table partially beyond EOD, truncated [ 718.782326] loop4: p1 start 62 is beyond EOD, truncated 19:46:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/d\x95v/smquencer\x00', 0x0, 0x0) [ 718.818456] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 718.875045] loop4: p3 size 2 extends beyond EOD, truncated [ 718.920615] loop4: p4 size 32768 extends beyond EOD, truncated [ 718.950503] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 718.988567] loop4: p6 size 32768 extends beyond EOD, truncated [ 719.101699] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 719.102170] Buffer I/O error on dev loop4p5, logical block 0, async page read 19:46:47 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050000003f000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8100) 19:46:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_mr_vif\x00') setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000240)={0x8, 0x1, 0x1b0, 0x5}, 0x10) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0f00000000000000000000000000000000000000000000000000000000000000000025f9b4b8c059333a00000000000000000000860000000a00"/77]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xf00a}]) 19:46:47 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x700000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:47 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:47 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x800000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x208000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000200)={0x1f, 0x1, 0x4, 0xebd2, 0xfffffffb, 0x1000}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) lseek(r3, 0x0, 0x3) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000100)) preadv(r2, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000000)) 19:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6b6b6b}]) [ 719.418248] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 719.436513] loop4: partition table partially beyond EOD, truncated 19:46:48 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc000) 19:46:48 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x806000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 719.466299] loop4: p1 start 63 is beyond EOD, truncated [ 719.495459] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:46:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x80, 0xa8, 0xda, 0x7f, 0x0, 0x5, 0x8, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x9, 0x4}, 0x8106, 0x73, 0xe67, 0x8, 0x2, 0x7f, 0x5}, r0, 0x7, 0xffffffffffffffff, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r3}) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) [ 719.542170] loop4: p3 size 2 extends beyond EOD, truncated [ 719.593605] loop4: p4 size 32768 extends beyond EOD, truncated [ 719.620448] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 719.669825] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:48 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xa00000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) r2 = socket(0x15, 0x1, 0xf) write(r2, &(0x7f0000000000)="220000002000070700be0000090007010200000000000000002000000500", 0x1e) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xfffb, 0x6}, 0x8) write$P9_RREADDIR(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x122) 19:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1000000}]) 19:46:48 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000040000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:48 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00e) 19:46:48 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xd00000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 719.959469] audit: type=1800 audit(1570045608.508:302): pid=18727 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17270 res=0 19:46:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000240)={'lapb0\x00', 0x24, 0x81}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2000000}]) [ 720.084129] audit: type=1804 audit(1570045608.508:303): pid=18727 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/935/file0" dev="sda1" ino=17270 res=1 19:46:48 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf000) 19:46:48 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2000000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 720.233255] audit: type=1800 audit(1570045608.508:304): pid=18727 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17270 res=0 [ 720.328682] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 720.341058] loop4: partition table partially beyond EOD, truncated 19:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4000000}]) [ 720.401875] loop4: p1 start 64 is beyond EOD, truncated 19:46:49 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ff) [ 720.450775] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:46:49 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2800000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 720.513119] loop4: p3 size 2 extends beyond EOD, truncated [ 720.538544] loop4: p4 size 32768 extends beyond EOD, truncated [ 720.562493] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 720.583620] loop4: p6 size 32768 extends beyond EOD, truncated [ 720.770400] audit: type=1804 audit(1570045609.328:305): pid=18731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/935/file0" dev="sda1" ino=17270 res=1 19:46:49 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000046000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7000000}]) 19:46:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r3, 0x6}, 0x8) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:49 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x33fe0) 19:46:49 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3c00000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000200)=""/4096, &(0x7f0000000000)=0x1000) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB='\x00\x00\x00\x00\x00\x00 \x00'/40], 0x98) [ 720.868283] audit: type=1800 audit(1570045609.358:306): pid=18731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17270 res=0 19:46:49 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4000000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa000000}]) 19:46:49 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x34000) 19:46:49 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x4305000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 721.251671] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 721.257467] loop4: partition table partially beyond EOD, truncated 19:46:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f0000000100)=@isdn={0x22, 0xf6, 0x9, 0x6, 0x6}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="1af5301573c627d1decc55f060ad1cfe711436970cc9b7a33680c932e484a7db8c87474828c5066dca4c469f7c3bf2a8e8cfcb700ce89d649aaaa70a7b717aa511f1bee17bfb2893738ec5371cdad1e9d0249e021691272c19787baf6e72551510f33f41cf1ec8f2d63e2068e6d8b24a8b8986b31cc7f4e19aed6bacc9c3478c7e4f3aaabe27240a3c02cd3a90a3b91ca302cceb7062c67fc529ad2311af4ce25dcb8a752147355ec851dd5f76d2d57e0849b11666077c3ea7df0e55937529380d47d7342afde70cfbcf0f8129305494a9b20e44659a52a459101a9792cf9b", 0xdf}, {&(0x7f0000000000)="797a32dda0f16f268f37618663039f844fc0d8639fa69ed7751687eb5664da7ca608a5092bc594dc8368a755", 0x2c}, {&(0x7f0000000300)="cd7354d00e1e1053462810c223eb7a8bc80bfe7c0d14f4f4770b39eaa98f928c0aa36d54e768ca5e56edf014b7ab66e2df95fbdcc4f82ddd70a6c7f8febc00634a9771d64fa972d0e1206c1e51384a3bfb41a8cb4a0ebb86d42ef15fe6f9741e745325f5c5629b7d3c598c0e248dda9b795bf2e1caab1f4bc52b508ed0fa060394af5974aa801e8bea43f07e97f12768e0c54d0303c61e681cc3151bd6c3b52efbf997dda6668ee3197c7afa2f824eb3eff55a", 0xb3}], 0x3, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x100}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x30}, 0x14080) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r5, r7) getgroups(0x7, &(0x7f00000005c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee01, 0x0, 0x0, r5]) r9 = getegid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r11) fstat(r11, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r13) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r17 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r16, r18) fsetxattr$system_posix_acl(r1, &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0xf, r3}], {0x4, 0x5}, [{0x8, 0x7, r8}, {0x8, 0x1, r9}, {0x8, 0x2, r10}, {0x8, 0x1, r12}, {0x8, 0x0, r14}, {0x8, 0x1, r16}], {0x10, 0x2}, {0x20, 0x4}}, 0x5c, 0x2) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 721.300803] loop4: p1 start 70 is beyond EOD, truncated [ 721.334274] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 721.378407] loop4: p3 size 2 extends beyond EOD, truncated [ 721.418412] loop4: p4 size 32768 extends beyond EOD, truncated 19:46:50 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6000000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 721.465063] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 721.530438] loop4: p6 size 32768 extends beyond EOD, truncated [ 721.749449] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 721.749531] print_req_error: 59 callbacks suppressed [ 721.749545] print_req_error: I/O error, dev loop4, sector 0 [ 721.762708] print_req_error: I/O error, dev loop4, sector 0 [ 721.769893] print_req_error: I/O error, dev loop4, sector 0 [ 721.779470] print_req_error: I/O error, dev loop4, sector 0 [ 721.785474] buffer_io_error: 49 callbacks suppressed [ 721.785484] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 721.793738] print_req_error: I/O error, dev loop4, sector 0 [ 721.804575] print_req_error: I/O error, dev loop4, sector 0 [ 721.812951] print_req_error: I/O error, dev loop4, sector 0 [ 721.818705] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 721.826706] print_req_error: I/O error, dev loop4, sector 0 [ 721.832540] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 721.840195] print_req_error: I/O error, dev loop4, sector 0 [ 721.845926] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 721.853697] print_req_error: I/O error, dev loop4, sector 0 [ 721.859447] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 721.867161] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 721.874617] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 721.882325] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 721.889739] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 721.897092] Buffer I/O error on dev loop4p3, logical block 0, async page read 19:46:50 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000047000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x10350000}]) 19:46:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000000f2, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0x2c8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r1, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="befeffff7d00000005fa000000000000000000000000000000000000000000000000000000000000000000000000000000001f00046e6f64657673656c66776d643573756d5b76626f786e65743070707030251700707070d3a13ff46744607f6e8f79553170726f63766d6e657431dd29776c616e302b5d91007367726f757070707031285c183f82751aacf2de8cca2560c6fb302e25903ec34b647d44210b25bfc20dc5e8a02a2df85b52f46d9346b7af1300e8b57db45087c06eedb2cd8448b0682801bff8c8fae1a18540ac3258e43027544a83b3f2c812663635660444fcfcb27de5bfe6916b8f829172c0cc08ffdfdacc37a46e404f33bdb14145a1d6218d178ba3b3f0bdb755480000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80140, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) r1 = socket$inet(0x2b, 0x801, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r3}, 0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r3, 0x1, 0x2, [0x8, 0x2]}, 0xc) 19:46:50 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x40000) 19:46:50 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x800e000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:50 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8035000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:50 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x80080) 19:46:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x202a0000}]) 19:46:50 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8100000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0f00000000000000000000000000000000000000000000006f84a872097226ab55000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000004000"/101]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x2a53da07a5a0e75c, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000540)=[{{r3, r4/1000+10000}, 0x15, 0x3, 0x9}, {{r5, r6/1000+10000}, 0x14, 0xe7f9, 0x50d}, {{0x0, 0x2710}, 0x11, 0x9d, 0x80}], 0x48) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) r7 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x80, 0x80802) getsockopt$TIPC_IMPORTANCE(r7, 0x10f, 0x7f, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 722.366876] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 722.389907] loop4: partition table partially beyond EOD, truncated [ 722.406933] loop4: p1 start 71 is beyond EOD, truncated [ 722.418883] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 722.446512] loop4: p3 size 2 extends beyond EOD, truncated [ 722.460802] loop4: p4 size 32768 extends beyond EOD, truncated [ 722.478209] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 722.517586] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:51 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012362000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = fcntl$getown(r0, 0x9) prctl$PR_SET_PTRACER(0x59616d61, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/\xa0\xcf\x00\x00enrer\x00', 0x101660, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:46:51 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x400300) 19:46:51 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x86ddffff00000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x283c0000}]) 19:46:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000240)={0x0, @bt={0x5, 0xfffffeff, 0x1, 0x2, 0xf85, 0x987, 0x8, 0x7, 0x3, 0x5, 0x1000, 0x3, 0x7fff, 0x6, 0x4, 0x20}}) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH', 0xffffffffffffffa8}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:51 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8847000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:51 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ffff) 19:46:51 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) listen(r1, 0xec) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xffffffffffffffc7) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) clock_gettime(0x0, &(0x7f0000000080)) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') close(r3) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000040)=""/12) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) 19:46:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2c000000}]) [ 722.992651] audit: type=1800 audit(1570045611.538:307): pid=19422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17334 res=0 19:46:51 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8848000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 723.039794] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:51 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1000000) [ 723.096879] audit: type=1804 audit(1570045611.578:308): pid=19422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/941/file0" dev="sda1" ino=17334 res=1 [ 723.139405] loop4: partition table partially beyond EOD, truncated [ 723.181885] loop4: p1 start 98 is beyond EOD, truncated [ 723.211151] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 723.263331] loop4: p3 size 2 extends beyond EOD, truncated [ 723.281690] audit: type=1800 audit(1570045611.578:309): pid=19422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17334 res=0 [ 723.327657] loop4: p4 size 32768 extends beyond EOD, truncated [ 723.340808] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 723.387985] loop4: p6 size 32768 extends beyond EOD, truncated [ 723.433929] audit: type=1804 audit(1570045611.578:310): pid=19422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/941/file0" dev="sda1" ino=17334 res=1 [ 723.547404] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 19:46:52 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012363000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x301f0000}]) 19:46:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0xd1, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x101}, 0x31000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) 19:46:52 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2000000) 19:46:52 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8864000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:52 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88a8ffff00000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='r\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e000000000000000001c990002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee7435fee1650e99cb879f3f3c4662bbe8218beaa1472e431a1443e81b59841becd65a34820810df01708bbdd227121e5d51c1c5fc37ef7ac136f91ccc30bd9d06c437ded99ea0ea10e7466ac61e3fdbc9ecaa1888eb4fe7eb3e3d90a78acf159e4dfdcc6d757588f408ad2406b9b476b8d6b6c2f7ed090b480488d6674667b2101ea40d423993acf8"], 0x18) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x9, 0xfb, 0xff, 0x3f, 0x4, 0xc6, 0x1, 0x0, 0x9, 0x6, 0xc2}, 0xb) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000100)={'veth1\x00', 0x5}) 19:46:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x33000000}]) 19:46:52 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3000000) 19:46:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000240)={0x18, 0x0, 0x2, {0xae7}}, 0x18) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:52 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 723.950741] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 723.987871] loop4: partition table partially beyond EOD, truncated [ 724.053957] loop4: p1 start 99 is beyond EOD, truncated [ 724.077844] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 724.093224] loop4: p3 size 2 extends beyond EOD, truncated [ 724.108305] loop4: p4 size 32768 extends beyond EOD, truncated [ 724.132920] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 724.169244] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:52 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000064000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x38310000}]) 19:46:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) rt_tgsigqueueinfo(r2, r0, 0x12, &(0x7f0000000100)={0x80, 0x0, 0xfffffffc}) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:52 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4000000) 19:46:52 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x88caffff00000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:52 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x1000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000000)={0x7, 0xff800000, 0x7}) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x43, 0x5, 0x1, 0xfffffffd}, {0x400, 0x2, 0x80, 0x1}, {0x4, 0x0, 0x1, 0x1}, {0xf849, 0x1, 0x3f, 0x1}, {0x5, 0x0, 0x6, 0x8001}, {0x1ff, 0x41, 0xeb}]}) 19:46:53 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8906000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x80, 0x80, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x6, 0x0, 0x0, 0x4d52}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={{0x77359400}}) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000000)={0x1}) 19:46:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3b000000}]) 19:46:53 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5000000) [ 724.598577] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 724.610415] loop4: partition table partially beyond EOD, truncated [ 724.627081] loop4: p1 start 100 is beyond EOD, truncated [ 724.674441] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 724.701708] audit: type=1800 audit(1570045613.248:311): pid=19810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17364 res=0 19:46:53 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8dffffff00000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 724.766946] loop4: p3 size 2 extends beyond EOD, truncated [ 724.780118] audit: type=1804 audit(1570045613.288:312): pid=19810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/946/file0" dev="sda1" ino=17364 res=1 19:46:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x54, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x0, 0x54}, {0x2, 0x9}, 0x4, 0x1, 0x7f}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 724.814928] loop4: p4 size 32768 extends beyond EOD, truncated [ 724.884402] audit: type=1800 audit(1570045613.288:313): pid=19810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17364 res=0 [ 724.930871] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 724.949829] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:53 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012364000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3c000000}]) 19:46:53 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xf5ffffff00000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:53 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6000000) 19:46:53 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xff00000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3f000000}]) 19:46:53 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8000000) 19:46:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) accept(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000000)=0x80) 19:46:54 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xfffffffffffff000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {}, {0x0, 0xfffffffffffffffd}}, {{@in=@dev={0xac, 0x14, 0x14, 0xf}}, 0x0, @in6=@loopback}}, 0xe8) close(r0) r1 = socket$inet(0x2b, 0x801, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r3}, 0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000240)=0x8) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0f00000000000000000000000000000000000000f10d000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000170000000000000000000000000000000000000000000000005327e58821c479890f57185a6f34cf0a316017e76d6dd8ed3a68e01626b6c9ee52492eae4731e2bb21aad17d29be3258bfd1db5f1ec9e01a3c29595138bcf4f6dd730599ee359df34ea462d46903c2d479e4e817eea55f896a2102"]}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r5, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 725.491346] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 725.496111] audit: type=1804 audit(1570045614.038:314): pid=19851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/946/file0" dev="sda1" ino=17364 res=1 [ 725.534727] loop4: partition table partially beyond EOD, truncated [ 725.582037] loop4: p1 start 100 is beyond EOD, truncated [ 725.601866] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:46:54 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 725.614270] audit: type=1800 audit(1570045614.048:315): pid=19851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17364 res=0 [ 725.649082] loop4: p3 size 2 extends beyond EOD, truncated [ 725.668532] loop4: p4 size 32768 extends beyond EOD, truncated 19:46:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x40000000}]) [ 725.689307] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 725.737684] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:54 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012365000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:54 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9000000) 19:46:54 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x40140000}]) 19:46:54 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 19:46:54 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa000000) 19:46:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x541045, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000100)={0x83, 0x3}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x48260000}]) 19:46:54 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x6]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 726.490099] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 726.494832] loop4: partition table partially beyond EOD, truncated [ 726.523853] loop4: p1 start 101 is beyond EOD, truncated [ 726.531963] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 726.548867] loop4: p3 size 2 extends beyond EOD, truncated [ 726.566983] loop4: p4 size 32768 extends beyond EOD, truncated [ 726.575383] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 726.584162] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:55 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012366000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xbc, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xfffffffffffffdf4, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="3b34d6405240cddb80308ab1170f7c9d"}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) prlimit64(r5, 0xd, &(0x7f0000000800)={0x5, 0x1}, &(0x7f0000000840)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000880)) ptrace(0x10, r4) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) getsockopt$inet_mreqsrc(r6, 0x0, 0xdcb9a36af59f39b8, &(0x7f0000000540)={@empty, @loopback, @broadcast}, &(0x7f0000000580)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r7, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:55 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb000000) 19:46:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:55 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x7]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x50090000}]) 19:46:55 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 726.870904] audit: type=1800 audit(1570045615.418:316): pid=20299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17389 res=0 19:46:55 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:46:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x581b0000}]) 19:46:55 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc000000) 19:46:55 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xa]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 727.159896] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 727.164666] loop4: partition table partially beyond EOD, truncated [ 727.191781] loop4: p1 start 102 is beyond EOD, truncated 19:46:55 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 727.207611] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 727.230043] loop4: p3 size 2 extends beyond EOD, truncated [ 727.255757] loop4: p4 size 32768 extends beyond EOD, truncated [ 727.281352] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 727.334746] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:56 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012367000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bind$x25(r0, &(0x7f0000000140)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r3, r5) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, r5, 0x1000) 19:46:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x60000000}]) 19:46:56 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe000000) 19:46:56 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x28]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) r3 = getpgid(r2) r4 = gettid() kcmp(r3, r4, 0x2, r0, 0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x05\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0xffffffff}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r5, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:56 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3c]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:56 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf000000) 19:46:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x18) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000240)={0x10000000000003}) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x11d3) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r3, 0x2) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r4) r5 = fcntl$dupfd(r4, 0x406, r0) write$P9_RCREATE(r5, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0xa5, 0x1, 0x4}, 0x7}}, 0x18) 19:46:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x68100000}]) 19:46:56 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x60]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 727.991235] loop4: p1 < > p2 p3 < p5 p6 > p4 19:46:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() getpgrp(r0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800000000, 0x151421) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 728.018370] loop4: partition table partially beyond EOD, truncated [ 728.037734] loop4: p1 start 103 is beyond EOD, truncated [ 728.050037] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 728.105085] loop4: p3 size 2 extends beyond EOD, truncated [ 728.140754] loop4: p4 size 32768 extends beyond EOD, truncated [ 728.184681] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 728.211842] loop4: p6 size 32768 extends beyond EOD, truncated 19:46:56 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012368000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6b6b6b00}]) 19:46:56 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xf0]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:56 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x10000000) 19:46:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r1, r0, 0x0, 0xf, &(0x7f0000000380)='/dev/sequencer\x00', 0xffffffffffffffff}, 0x30) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1e) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x20, 0x9, 0x81, 0x4, 0x0, 0x1000, 0x1, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc951, 0x1, @perf_config_ext={0x1, 0x3}, 0x6040, 0x4, 0x100, 0x2, 0x2, 0x9, 0x400}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) tkill(r2, 0x1e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000580)=0x0) r5 = syz_open_procfs(r4, &(0x7f00000005c0)='net\x00\x00\x00\x005}\xd8]\x88\x12]\xf1\x99-\x9d&\x9d\xe3\xf7\xa2=\xd8\x0f\x8d\xc9\xfe\x84\x18\xcd\x9fb\xc5>\x82\x0f\"\a\xac\x8c\x1c\xebyj\xec\xa5\x00\b\x00\x00\xa6I\xbe\v\xe8\xc4\xce\x9f\xe1\xcbH`\x00'/78) preadv(r5, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x2000, 0x0) r7 = socket$inet6(0xa, 0x1, 0x0) listen(r7, 0xec) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x7ff, @mcast2, 0x9}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x5}, @in6={0xa, 0x4e24, 0x3, @mcast2, 0x741}], 0x64) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r0, 0x1, [], r6, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r8, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7ff, 0xfffffffffffffbff, 0x1ff}) r9 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r9) ioctl$sock_inet_tcp_SIOCATMARK(r9, 0x8905, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000080)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000200)=0xe8) bind$packet(r0, &(0x7f0000000240)={0x11, 0xc, r10, 0x1, 0x15, 0x6, @dev={[], 0x28}}, 0x14) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x8, 0x0, 0x3007, 0x27, 0x0, {0x80010001, 0x1f}, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x2, 0x249440) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000340)=0xf3, 0x4) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}) accept4$unix(r2, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e, 0x80000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'hsr0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0f000000000000000000000000000000000000007f000000000000000000000000000000000000000000000084800000000000000000010000000000fcffffff0000c6ae21c25dedd6af509e3c6320be00000000000000000000be00"/106]}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x585043, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:57 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x300]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 19:46:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x76050000}]) 19:46:57 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x14000000) 19:46:57 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x500]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x234000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc67c4d25f780af65, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket(0x10, 0x8000000803, 0x0) write(r2, &(0x7f0000000000)="220000002000070700be0000090007010200000000000000002000000500", 0x1e) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000140), 0x4) [ 728.743672] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 728.762447] loop4: partition table partially beyond EOD, truncated [ 728.789316] loop4: p1 start 104 is beyond EOD, truncated [ 728.836939] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 728.873496] loop4: p3 size 2 extends beyond EOD, truncated [ 728.912674] loop4: p4 size 32768 extends beyond EOD, truncated [ 728.944330] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 728.964066] loop4: p6 size 32768 extends beyond EOD, truncated [ 729.110950] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 729.115518] loop4: partition table partially beyond EOD, truncated [ 729.122872] loop4: p1 start 104 is beyond EOD, truncated [ 729.128537] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 729.136064] loop4: p3 size 2 extends beyond EOD, truncated [ 729.142802] loop4: p4 size 32768 extends beyond EOD, truncated [ 729.149628] loop4: p5 size 1073741824 extends beyond EOD, truncated 19:46:57 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012369000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x78050000}]) 19:46:57 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x31030000) 19:46:57 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x543]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmat(r0, &(0x7f0000fef000/0x4000)=nil, 0x7000) r1 = shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmdt(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 729.156705] loop4: p6 size 32768 extends beyond EOD, truncated [ 729.265628] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 729.274252] print_req_error: 100 callbacks suppressed [ 729.274263] print_req_error: I/O error, dev loop4, sector 0 [ 729.274281] print_req_error: I/O error, dev loop4, sector 0 [ 729.280146] print_req_error: I/O error, dev loop4, sector 0 [ 729.301466] print_req_error: I/O error, dev loop4, sector 0 [ 729.307650] print_req_error: I/O error, dev loop4, sector 0 [ 729.313710] buffer_io_error: 90 callbacks suppressed [ 729.313719] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 729.327547] print_req_error: I/O error, dev loop4, sector 0 [ 729.333609] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 729.342396] print_req_error: I/O error, dev loop4, sector 0 [ 729.348185] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 729.359629] print_req_error: I/O error, dev loop4, sector 0 19:46:57 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x600]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 729.365397] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 729.373299] print_req_error: I/O error, dev loop4, sector 0 [ 729.379230] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 729.390071] print_req_error: I/O error, dev loop4, sector 0 [ 729.395849] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 729.408252] Buffer I/O error on dev loop4p4, logical block 0, async page read 19:46:58 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 729.415771] Buffer I/O error on dev loop4p3, logical block 0, async page read [ 729.423206] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 729.430797] Buffer I/O error on dev loop4p5, logical block 0, async page read 19:46:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x883a0000}]) 19:46:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000140)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x471ba6bd4c64c533, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) 19:46:58 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x608]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:58 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x60000000) [ 729.981762] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) 19:46:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r2, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) write$P9_RSTATu(r1, &(0x7f00000007c0)={0x1ff, 0x7d, 0x0, {{0x500, 0x1e0, 0x0, 0x0, {0xd2}, 0x8640eb295d0787d1, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH', 0xe6, '\x80D\x9bR\x05\x91\xd5\xbc\x1a\xacx\x91]h\xa2\x1a\x1c\n3\x9a\xe67\a\xcb^3\xc4\xcax_B\xb7?\xa1\xda\x96\xf1\x9d\xd9\xf8\x12\xf3\x98\xaaz\xbdD\x19T\xc1\xf5\f\xbd\xc7\xd8\x82\x1e\xda\xfa\x11j\bcRA\xbfe\xeb\xe0\t\x9a\x1f\xfb\f\xffV\x0e\xc7\x1d\xf0\xa9\x1a\xe4\xfe\xca\xc5\xf8\xab\rL\x8c\xc3/?\xcd3\x19\x9eC\xfa\xe1\xfc\xe8P\x94\xf0x\x81\xb9\r\xcdu\xf7\xf4P\n\x01&\xf3\xdb8&\xe1ka\x88{\x8cX\xd7eO\xc6\xc9&\x92\x1e\x9c\x8e)\xbf\xbd\xc1\xc7Y\xf9\xdaXJ\xee\xe9\xff\x9eN\x02o\xf9S\a\xf5\x90y.[<\xd9\x92\x1c\xe3\xea\xcf\x94P\xd1\xe45\x01\xa2\xb8\x94\x7fK\xa5\x9d\b\xfda\xabl\xa2\xf3\x90\xed\xf4\'DU\x92\x1b\x93\xd0\x00\xc1a\x02x\xf9\xc7\xbf\xb7\xb0\xba\x99\xcc\xe60.\xd1\x02\xc0\xfd\x843r\x8e\x84\xe8\xd3\x9e\n'}, 0xa, '/dev/nbd#\x00', 0x0, 0x0, r5}}, 0x1ff) 19:46:58 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236a000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x982f0000}]) 19:46:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2d63707520fbff656d6f7279202d72646d6120"], 0x13) 19:46:58 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x689]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:58 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x65580000) 19:46:58 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x700]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x800, &(0x7f0000000100)='/dev/sequencer\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:58 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6b3545e1) 19:46:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa8240000}]) 19:46:59 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x806]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 730.492220] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 730.497095] loop4: partition table partially beyond EOD, truncated [ 730.530808] loop4: p1 start 106 is beyond EOD, truncated 19:46:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000200)={r0, r1+30000000}, 0xf2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) syz_open_dev$sndpcmc(&(0x7f0000000000)='/\xb0i2\xd0snd/pcmC#D#c\x00', 0x0, 0x80) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:46:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e6080300000000000000a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100, 0x0) splice(r0, &(0x7f0000000000), r1, &(0x7f00000000c0), 0x4b, 0x2) [ 730.537429] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 730.553069] loop4: p3 size 2 extends beyond EOD, truncated [ 730.588780] loop4: p4 size 32768 extends beyond EOD, truncated [ 730.645872] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 730.677826] loop4: p6 size 32768 extends beyond EOD, truncated [ 730.841966] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 19:46:59 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236b000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:46:59 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xa00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xaa050000}]) 19:46:59 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x80000800) 19:46:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xa}, 0x40}, 0x0, 0xd, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:46:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000005c0)={0x8}, 0x0, &(0x7f0000000200)={r0, r1+10000000}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x119) 19:46:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x26280, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) 19:46:59 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xd00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb0360000}]) 19:46:59 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x81000000) 19:46:59 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xe80]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:46:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) getsockname$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000000c0), 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 731.285967] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 731.324854] loop4: partition table partially beyond EOD, truncated [ 731.363830] loop4: p1 start 107 is beyond EOD, truncated [ 731.373294] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 731.410596] loop4: p3 size 2 extends beyond EOD, truncated [ 731.436792] loop4: p4 size 32768 extends beyond EOD, truncated [ 731.460600] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 731.486454] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:00 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236c000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0x73, 0xffffffc1, 0x7, 0x4, 0x7}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r3, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:00 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, r0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) 19:47:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb8190000}]) 19:47:00 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:00 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x88a8ffff) 19:47:00 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2800]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x284200, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x3f, 0x4002) 19:47:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc02b0000}]) 19:47:00 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9effffff) 19:47:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/113, 0x71}, {&(0x7f00000002c0)=""/240, 0xf0}, {&(0x7f0000000680)=""/200, 0xc8}, {&(0x7f00000007c0)=""/166, 0xa6}, {&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000880)=""/243, 0xf3}], 0x6, &(0x7f00000003c0)=[{&(0x7f0000000980)=""/213, 0xd5}, {&(0x7f0000000a80)=""/233, 0xe9}, {&(0x7f0000000b80)=""/118, 0x76}], 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:00 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3580]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 731.993952] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 731.999052] loop4: partition table partially beyond EOD, truncated [ 732.051771] loop4: p1 start 108 is beyond EOD, truncated [ 732.058700] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 732.079322] loop4: p3 size 2 extends beyond EOD, truncated [ 732.095138] loop4: p4 size 32768 extends beyond EOD, truncated [ 732.111417] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 732.134211] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:00 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236d000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:00 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3c00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:00 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc0000000) 19:47:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc80e0000}]) 19:47:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x4, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0_to_hsr\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x9, 0x8d174e7f53c73760, 0x7, 0x3, r1}, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x4) 19:47:01 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x4000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:01 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00e0000) 19:47:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd0200000}]) 19:47:01 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x4305]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) wait4(r1, &(0x7f0000000240), 0x1, 0x0) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0x8, @loopback}], 0x2c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r3, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r4, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 732.666030] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 732.680473] loop4: partition table partially beyond EOD, truncated [ 732.729273] loop4: p1 start 109 is beyond EOD, truncated [ 732.742207] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 732.764340] loop4: p3 size 2 extends beyond EOD, truncated [ 732.805583] loop4: p4 size 32768 extends beyond EOD, truncated [ 732.844238] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 732.861841] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:01 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236e000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:01 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x4788]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:01 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}}, r0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200180) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f00000003c0)=ANY=[@ANYBLOB="0400"/168]) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x164, r2, 0x4, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x14}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xde}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb65b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f9bc958}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffeffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x25041}, 0x28005010) inotify_init1(0x80c00) 19:47:01 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe03f0300) 19:47:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd8030000}]) 19:47:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@nfc_llcp, &(0x7f00000000c0)=0x80, 0x40000) socket$l2tp(0x18, 0x1, 0x1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000002c0), 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:01 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x4888]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xe0000000}]) 19:47:01 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe145356b) 19:47:01 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x6000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r1) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000000c0)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xe0150000}]) [ 733.496819] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 733.508704] loop4: partition table partially beyond EOD, truncated [ 733.527783] loop4: p1 start 110 is beyond EOD, truncated [ 733.568936] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 733.603260] loop4: p3 size 2 extends beyond EOD, truncated [ 733.631655] loop4: p4 size 32768 extends beyond EOD, truncated [ 733.667143] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 733.685388] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:02 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001236f000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:02 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x6488]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:02 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ffffff) 19:47:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xf00a0000}]) 19:47:02 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:47:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000500)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r5 = dup(r0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @multicast2}, &(0x7f0000000300)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000340)={@mcast1, 0x4b, r6}) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="818cd075ddb4d1321a70ec4f03ac4c223c54e4aa97c4a99268427d3697ab59df1e6aed59d21f748fbdf9542bdf261c5ca73a4a0445981e0b208ef64aa2bbb3958119382344f3fc65d474243fb2495b44a090d51d763bee65d84a4432d911355cb8a36781", @ANYRES16=r4, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000400)={0x5, 0x0, 0x6, 0x401, 0x7, 0x9, 0x1, 0xc1, 0x1, 0x6}) r7 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f0000000480)={{0x2, 0x5, @dev={0xac, 0x14, 0x14, 0x10}}, {0x306}, 0x80791072ba4d20e3, {0x2, 0x4e20, @local}, 'ip6_vti0\x00'}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x52040}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="a2900893", @ANYRES16=r4, @ANYBLOB="000227bd7000fedbdf250d000000540007000c000400040000000000000008000100090000000c000400e90000000000000008000200020000000800020001000000080001006e6900000c00030001000000000000000c0003007f0000000000000004000100"], 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x4) r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/userio\x00', 0x303440, 0x0) dup3(r3, r8, 0x80000) 19:47:02 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x800e]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xf5ffffff}]) [ 734.243061] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 734.247860] loop4: partition table partially beyond EOD, truncated 19:47:02 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xfff00000) [ 734.290344] loop4: p1 start 111 is beyond EOD, truncated 19:47:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r0}) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1e) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000200)={{0x4, 0x0, 0x6, 0x80000001, 'syz1\x00', 0x38000}, 0x0, 0x8, 0x20e, r4, 0x1, 0x4, 'syz0\x00', &(0x7f0000000140)=['\x00'], 0x1, [], [0x8580, 0x81, 0x8, 0xfffc]}) [ 734.331677] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 734.377159] kauditd_printk_skb: 2 callbacks suppressed [ 734.377174] audit: type=1800 audit(1570045622.928:319): pid=22329 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16658 res=0 [ 734.417247] loop4: p3 size 2 extends beyond EOD, truncated 19:47:03 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8035]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 734.455902] loop4: p4 size 32768 extends beyond EOD, truncated [ 734.495957] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 734.552678] loop4: p6 size 32768 extends beyond EOD, truncated [ 734.589489] audit: type=1804 audit(1570045622.948:320): pid=22329 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/973/file0" dev="sda1" ino=16658 res=1 19:47:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xfffffff5}]) [ 734.840138] audit: type=1800 audit(1570045622.948:321): pid=22329 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16658 res=0 19:47:03 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8100]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:03 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012370000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:03 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000080)) 19:47:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0xa40, 0x0) readlinkat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=""/117, 0x75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 19:47:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xffffa888) 19:47:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6b6b6b00000000}]) 19:47:03 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8847]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:03 executing program 2: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\xfd\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000100)=""/11, 0xb}, 0x11c) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xe) write$UHID_DESTROY(r0, &(0x7f0000000140), 0x4) r1 = gettid() tkill(r1, 0x1000000000013) 19:47:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xfffff000) 19:47:03 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="5500000018007f0100fe01b2a4a280930a06000000a84306910000000b000f0035020000060003d91900154004000001d40240dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r4, 0x1, [], r6, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'caif0\x00', 0x600}) [ 735.254301] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.287303] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 19:47:03 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8848]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x100000000000000}]) [ 735.308872] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 19:47:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xffffff7f) [ 735.359163] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 735.386005] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.412076] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 735.420106] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.436421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.444963] IPv6: NLM_F_CREATE should be specified when creating new route [ 735.457130] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.465502] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.477430] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 735.486423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.489844] IPv6: Can't replace route, no match found [ 735.508107] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.533058] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 735.557260] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 735.591970] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 735.601414] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 735.605167] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 735.605944] loop4: partition table partially beyond EOD, truncated [ 735.625494] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 735.627585] loop4: p1 start 112 is beyond EOD, truncated [ 735.635429] IPv6: Can't replace route, no match found [ 735.644779] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 735.683654] loop4: p3 size 2 extends beyond EOD, truncated [ 735.730659] loop4: p4 size 32768 extends beyond EOD, truncated [ 735.739195] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 735.747297] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:04 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012371000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8864]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x200000000000000}]) 19:47:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:47:04 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xffffff9e) 19:47:04 executing program 2: socket$pppoe(0x18, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000100)={0x10001, 0x9f0}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f00000000c0)={r5}) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000200)={r5}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000200)={r8}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x40000, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r11 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) ioctl$KVM_IRQFD(r10, 0x4020ae76, &(0x7f0000000200)={r11}) ioctl$KVM_GET_IRQCHIP(r4, 0x4020aeb2, &(0x7f0000000280)={0x0, 0x0, @ioapic}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x101580, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r12 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r12, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r12) socket$inet6_tcp(0xa, 0x1, 0x0) 19:47:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8906]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:04 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xffffffffffffff90, &(0x7f0000000100)={&(0x7f00000000c0)={0xffffffffffffffc9, r0, 0x20, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) 19:47:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x400000000000000}]) 19:47:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xf000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:04 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xfffffff0) 19:47:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xff00]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 736.190459] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 736.196150] loop4: partition table partially beyond EOD, truncated [ 736.213719] loop4: p1 start 113 is beyond EOD, truncated [ 736.237229] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 736.265289] loop4: p3 size 2 extends beyond EOD, truncated [ 736.297220] loop4: p4 size 32768 extends beyond EOD, truncated [ 736.331438] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 736.362167] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=""/163, 0xa3}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x10040, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 19:47:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xf0ffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x700000000000000}]) 19:47:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x200000000000012, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 19:47:05 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012372000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:05 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8000000000) 19:47:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x1000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb0360000}]) 19:47:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa00000000000000}]) 19:47:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() getpgrp(r0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800000000, 0x151421) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:05 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ff00000000) 19:47:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 736.943031] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 736.965279] loop4: partition table partially beyond EOD, truncated [ 736.990136] loop4: p1 start 114 is beyond EOD, truncated [ 736.996696] loop4: p2 size 1073741824 extends beyond EOD, truncated 19:47:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x1035000000000000}]) 19:47:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xbc, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xfffffffffffffdf4, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="3b34d6405240cddb80308ab1170f7c9d"}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) prlimit64(r5, 0xd, &(0x7f0000000800)={0x5, 0x1}, &(0x7f0000000840)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000880)) ptrace(0x10, r4) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) getsockopt$inet_mreqsrc(r6, 0x0, 0xdcb9a36af59f39b8, &(0x7f0000000540)={@empty, @loopback, @broadcast}, &(0x7f0000000580)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r7, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 737.015309] loop4: p3 size 2 extends beyond EOD, truncated [ 737.028786] loop4: p4 size 32768 extends beyond EOD, truncated 19:47:05 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 737.090371] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 737.122101] loop4: p6 size 32768 extends beyond EOD, truncated [ 737.279201] audit: type=1800 audit(1570045625.828:322): pid=22753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16978 res=0 19:47:05 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012373000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:05 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4000000000000) 19:47:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80140, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) r1 = socket$inet(0x2b, 0x801, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r3}, 0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r3, 0x1, 0x2, [0x8, 0x2]}, 0xc) 19:47:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x202a000000000000}]) 19:47:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xbc, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xfffffffffffffdf4, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="3b34d6405240cddb80308ab1170f7c9d"}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) prlimit64(r5, 0xd, &(0x7f0000000800)={0x5, 0x1}, &(0x7f0000000840)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000880)) ptrace(0x10, r4) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) getsockopt$inet_mreqsrc(r6, 0x0, 0xdcb9a36af59f39b8, &(0x7f0000000540)={@empty, @loopback, @broadcast}, &(0x7f0000000580)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r7, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) [ 737.440313] audit: type=1804 audit(1570045625.928:323): pid=22752 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/980/file0" dev="sda1" ino=16978 res=1 19:47:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) 19:47:06 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8008000000000) [ 737.547314] audit: type=1800 audit(1570045625.958:324): pid=22752 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16978 res=0 19:47:06 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x6000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x283c000000000000}]) [ 737.650384] audit: type=1800 audit(1570045626.198:325): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16627 res=0 19:47:06 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x5a6001, 0x1cc) syslog(0x0, &(0x7f00000002c0)=""/4096, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000000)={0x200}, 0x3a5) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040), 0x4) socket(0x11, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f00000004c0)="d7fe15c1b673255e04c6bc15a6da85ac708c", 0x12, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x2, [0x7fffffff, 0x2a2d, 0x6, 0x9, 0x1, 0x20, 0x20, 0x40]}) [ 737.710870] audit: type=1804 audit(1570045626.238:326): pid=22790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942943815/syzkaller.0yOrfW/981/file0" dev="sda1" ino=16627 res=1 [ 737.726433] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 737.799693] loop4: partition table partially beyond EOD, truncated 19:47:06 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x40030000000000) [ 737.854239] loop4: p1 start 115 is beyond EOD, truncated [ 737.871604] audit: type=1800 audit(1570045626.248:327): pid=22790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16627 res=0 [ 737.897790] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 737.976913] loop4: p3 size 2 extends beyond EOD, truncated [ 738.030872] loop4: p4 size 32768 extends beyond EOD, truncated [ 738.042095] audit: type=1800 audit(1570045626.438:328): pid=22805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17137 res=0 [ 738.099220] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 738.146630] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:06 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012374000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:06 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x7000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x2c00000000000000}]) 19:47:06 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ffffffffffff) 19:47:06 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x40030000000000) 19:47:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x301f000000000000}]) 19:47:07 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x5a6001, 0x1cc) syslog(0x0, &(0x7f00000002c0)=""/4096, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000000)={0x200}, 0x3a5) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040), 0x4) socket(0x11, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f00000004c0)="d7fe15c1b673255e04c6bc15a6da85ac708c", 0x12, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x2, [0x7fffffff, 0x2a2d, 0x6, 0x9, 0x1, 0x20, 0x20, 0x40]}) 19:47:07 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x100000000000000) 19:47:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 19:47:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8060000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 738.821278] loop4: p1 < > p2 p3 < p5 p6 > p4 19:47:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3300000000000000}]) [ 738.843539] loop4: partition table partially beyond EOD, truncated [ 738.875232] loop4: p1 start 116 is beyond EOD, truncated [ 738.895835] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 738.920870] loop4: p3 size 2 extends beyond EOD, truncated [ 738.944606] loop4: p4 size 32768 extends beyond EOD, truncated [ 738.976100] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 738.995003] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:07 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012375000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xa000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 19:47:07 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x200000000000000) 19:47:07 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x5a6001, 0x1cc) syslog(0x0, &(0x7f00000002c0)=""/4096, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000000)={0x200}, 0x3a5) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040), 0x4) socket(0x11, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f00000004c0)="d7fe15c1b673255e04c6bc15a6da85ac708c", 0x12, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x2, [0x7fffffff, 0x2a2d, 0x6, 0x9, 0x1, 0x20, 0x20, 0x40]}) 19:47:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3831000000000000}]) 19:47:07 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xd000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:08 executing program 3: ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet(0x2, 0x3, 0x19) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r2) sendto$inet6(r2, &(0x7f0000000280)="f4f47a167b26871bff7fb377fa6bf4c35b2020e906516a6aeefcb619083e3f52ded018b826f591fb854b82a47fc498f639346bba5157f4754d9296d0dfd10fa1c8f56a557cf9cc6b730036288a518451971270b4f5a1ee88f02c0f55f7f0891b446a8c1fcbfd6c67d1f102507e23b63ee95ad7a6359d9b83db851c9c2105b168ae21adfd2d1b377045f60c1a1ef771cb4e9709004268fe9580e6ea79fa812705008a8d2a9328b9906fcd31e2042f8db697298a02cbe87385c4b2549110330f70c42fd6d4eba117db85f5ff094fc7fd4344ba44766812eb824b9c23469eebc440ffbe4214", 0xe4, 0x0, &(0x7f0000000380)={0xa, 0x4e24, 0xb7, @mcast2, 0x6}, 0x1c) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x4e21}, {0x0, 0x0, 0x4000000000000}, {0x0, 0x0, 0xfffffffffffffffe}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000240)='erspan0\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac14443d3ce7c1e9aa2d0000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0d80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @identifier="4011a0a2c30ad2d8d6ec2fcb6a9e3c5c"}}) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r4 = dup2(r3, 0xffffffffffffffff) ioctl$VIDIOC_G_CROP(r4, 0xc014563b, &(0x7f0000000140)={0x1, {0x101, 0x13, 0x8, 0x3}}) 19:47:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x300000000000000) 19:47:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x20000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3b00000000000000}]) [ 739.670017] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 739.674636] loop4: partition table partially beyond EOD, truncated 19:47:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5) [ 739.750350] loop4: p1 start 117 is beyond EOD, truncated [ 739.785735] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 739.821933] loop4: p3 size 2 extends beyond EOD, truncated [ 739.837665] loop4: p4 size 32768 extends beyond EOD, truncated [ 739.856335] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 739.919465] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:08 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012376000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x28000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/de\x1eP9\xf6\xa5R\x81\x83\x00\x04\b\x00', 0x0, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000100)={0x1, 0x1, 0x8da}) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4000, 0x0) 19:47:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x400000000000000) 19:47:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3c00000000000000}]) 19:47:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r2, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000240), &(0x7f0000000280)=0x4) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x0, 0x0, &(0x7f0000002100)) fchdir(r6) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000002c0)={[], 0x2, 0x0, 0x3ff, 0x21d0, 0x3, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r5, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) 19:47:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3c000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x8000000803, 0x0) write(r0, &(0x7f0000000000)="220000002000070700be0000090007010200000000000000002000000500", 0x1e) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) r2 = accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000140)=0x60) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r3, 0x1, [], r5, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@mcast2, 0x46, r5}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 19:47:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x3f00000000000000}]) 19:47:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x500000000000000) 19:47:08 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x40000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r5 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r6 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r6) r7 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r8 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r8) r9 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r9) r10 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x95, 0x209e1e, 0x3, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r11, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r12}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r12, 0x7, 0x10}, 0xc) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r12, 0x4c4, 0x8}, 0xc) r14 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r14, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r15 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r15) r16 = syz_open_pts(r1, 0xa80) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x1e) r18 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r20 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r19, r21) r22 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r24 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setregid(r23, r25) getgroups(0x6, &(0x7f0000000400)=[r19, 0xee01, r25, 0xee01, 0xee00, 0xee00]) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000000)="3a7e588fd29189526f81644aeaa7f674fab3b3017ecb5b9285dc2f804bc0c9bb554ec7e6", 0x24}, {&(0x7f0000000100)}, {&(0x7f0000000200)="7209fb4c544f9186b66b1c385177a939f9f0fc3f8e7ba8aa7909b80a4810069c9fac576fae2b7e34ce3abc61e4e34f682d4189cddc19e64f6abf94fce7cdd4489b68ba699ee84096d04feee5f2f1a1f33a23fae0693719fd40b9662616ec7f18a7896280ad7e0e3e38628ef9a4d59807d613ad2a22dbd72c8a8022f64dc45df0fd7e7ab0fcc3b90b4a51baebdcbe8b6a781425d3d49bfa5db62fcdf8003cbbb70601dbc75aa947f109b49bbde588066fa66078af551a147d3cbb8a06808d8ad66d33b2e621407e736d2ca9dd767f8cf834efe6f96a43ecb7055bf9c8d64cd182120147c0d8b233794f14de3fce7acba8208f35", 0xf3}, {&(0x7f0000000300)="20d0fb76de9562c959e9a9dd5a653235ff3dc2284b419b6dbcdb025c94e68e6329d6d06a4cd070d32cc419de3ea459010e9477e2f185dcfac511ad6c07d5fd010d8849559cb89ff0ba4e82c35378546f1241852505e5876a83cd487028cf4c40c2b4f61633ae1f70ddeaf11affcbf27b55a30a0b62fdd83d938a1c790740cbb2d9b5d2a65c4b79cdfe00357c568445f4b298ccde572c1daca2578e9eea5c543a6df150f81c17b38d12f69225939198dded10d1e36fc73a695270e623fbb6", 0xbe}], 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=0xee00, @ANYRES32=r26, @ANYBLOB='\x00\x00\b\x00'], 0xb0, 0x20000000}, 0x84809) [ 740.481782] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 740.486613] loop4: partition table partially beyond EOD, truncated [ 740.500100] loop4: p1 start 118 is beyond EOD, truncated [ 740.534831] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 740.595785] loop4: p3 size 2 extends beyond EOD, truncated [ 740.619480] loop4: p4 size 32768 extends beyond EOD, truncated [ 740.658850] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 740.685453] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:09 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012377000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000640)={0x5, 0x0, 0x2015, 0x8, 0x0, {0x10001, 0x1f}}) r0 = getpid() request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='ppp1procvmnet1\xdd)wlan0+]', 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000001400)=@ethtool_coalesce={0xf}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) write$P9_RSTATu(r1, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r2}, 0x10) 19:47:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4000000000000000}]) 19:47:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x43050000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:09 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x600000000000000) 19:47:09 executing program 2 (fault-call:0 fault-nth:0): syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x60000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 740.934884] FAULT_INJECTION: forcing a failure. [ 740.934884] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.024258] CPU: 0 PID: 23408 Comm: syz-executor.2 Not tainted 4.19.76 #0 [ 741.031260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.040631] Call Trace: [ 741.043254] dump_stack+0x172/0x1f0 [ 741.046914] should_fail.cold+0xa/0x1b [ 741.050836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.055964] ? __might_sleep+0x95/0x190 [ 741.059958] __alloc_pages_nodemask+0x1ee/0x750 [ 741.064634] ? __lock_acquire+0x6ee/0x49c0 [ 741.069000] ? __alloc_pages_slowpath+0x2870/0x2870 19:47:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x800e0000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 741.074017] ? _kstrtoull+0x14c/0x200 [ 741.074033] ? __lock_acquire+0x6ee/0x49c0 [ 741.074049] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.074061] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.074083] alloc_pages_vma+0xdd/0x590 [ 741.074182] wp_page_copy+0xc75/0x16a0 [ 741.074202] ? get_pid_task+0xd4/0x190 [ 741.074221] ? pmd_pfn+0x1d0/0x1d0 [ 741.074243] ? kasan_check_read+0x11/0x20 [ 741.074258] ? do_raw_spin_unlock+0x57/0x270 [ 741.074273] do_wp_page+0x57d/0x10b0 19:47:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x80350000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 741.074290] ? lock_acquire+0x16f/0x3f0 [ 741.125771] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 741.130472] ? kasan_check_write+0x14/0x20 [ 741.134731] ? do_raw_spin_lock+0xc8/0x240 [ 741.138984] __handle_mm_fault+0x2305/0x3f80 [ 741.143415] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 741.148296] ? count_memcg_event_mm+0x2b1/0x4d0 [ 741.148318] handle_mm_fault+0x1b5/0x690 [ 741.148339] __do_page_fault+0x62a/0xe90 [ 741.148357] ? ksys_write+0x1f1/0x2d0 [ 741.164938] ? vmalloc_fault+0x740/0x740 [ 741.164958] ? trace_hardirqs_off_caller+0x65/0x220 [ 741.164973] ? trace_hardirqs_on_caller+0x6a/0x220 [ 741.164990] ? page_fault+0x8/0x30 [ 741.165011] do_page_fault+0x71/0x57d [ 741.165026] ? page_fault+0x8/0x30 [ 741.165046] page_fault+0x1e/0x30 [ 741.193353] RIP: 0033:0x402dc4 [ 741.196559] Code: d7 48 29 c7 4c 8b 01 4c 89 c0 49 f7 e1 48 c1 ea 1b 48 89 d0 48 c1 e2 1b 48 c1 e0 14 48 01 c2 49 29 d0 49 39 f8 4c 89 c2 77 44 <4c> 89 01 48 8b 44 24 18 48 01 d2 48 39 c2 76 05 48 89 54 24 18 48 [ 741.215565] RSP: 002b:00007f9e0c43ba00 EFLAGS: 00010287 19:47:09 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x81000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:09 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x800000000000000) [ 741.220973] RAX: 0000000000000000 RBX: 0000000020000040 RCX: 0000000020001010 [ 741.228264] RDX: 0000000000000000 RSI: 00000000000000a8 RDI: 0000000008100000 [ 741.235553] RBP: 000000000075bf20 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 741.242839] R10: 0000000008100000 R11: 0000000000000000 R12: 00007f9e0c43c6d4 [ 741.250130] R13: 00000000004be692 R14: 00000000004e0840 R15: 0000000000000003 19:47:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4014000000000000}]) [ 741.277931] syz-executor.2 invoked oom-killer: gfp_mask=0x0(), nodemask=(null), order=0, oom_score_adj=1000 [ 741.293201] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 741.299256] CPU: 1 PID: 23408 Comm: syz-executor.2 Not tainted 4.19.76 #0 [ 741.306207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.315586] Call Trace: [ 741.318196] dump_stack+0x172/0x1f0 [ 741.321851] dump_header+0x15e/0xa55 [ 741.326559] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 741.331685] ? ___ratelimit+0x60/0x595 [ 741.335591] ? do_raw_spin_unlock+0x57/0x270 [ 741.340000] oom_kill_process.cold+0x10/0x6ef [ 741.344496] ? lock_downgrade+0x880/0x880 [ 741.348645] ? kasan_check_read+0x11/0x20 [ 741.352803] out_of_memory+0x936/0x12d0 [ 741.356766] ? lock_acquire+0x1ea/0x3f0 [ 741.360739] ? oom_killer_disable+0x280/0x280 [ 741.365227] ? mutex_trylock+0x18e/0x1e0 [ 741.369276] ? pagefault_out_of_memory+0xf3/0x124 [ 741.374117] pagefault_out_of_memory+0x111/0x124 [ 741.378860] ? out_of_memory+0x12d0/0x12d0 [ 741.383094] mm_fault_error+0x10e/0x380 [ 741.387059] __do_page_fault+0xd69/0xe90 [ 741.391116] ? ksys_write+0x1f1/0x2d0 [ 741.394915] ? vmalloc_fault+0x740/0x740 [ 741.398986] ? trace_hardirqs_off_caller+0x65/0x220 [ 741.403992] ? trace_hardirqs_on_caller+0x6a/0x220 [ 741.408918] ? page_fault+0x8/0x30 [ 741.412449] do_page_fault+0x71/0x57d [ 741.416286] ? page_fault+0x8/0x30 [ 741.419817] page_fault+0x1e/0x30 [ 741.423266] RIP: 0033:0x402dc4 [ 741.426449] Code: d7 48 29 c7 4c 8b 01 4c 89 c0 49 f7 e1 48 c1 ea 1b 48 89 d0 48 c1 e2 1b 48 c1 e0 14 48 01 c2 49 29 d0 49 39 f8 4c 89 c2 77 44 <4c> 89 01 48 8b 44 24 18 48 01 d2 48 39 c2 76 05 48 89 54 24 18 48 [ 741.445338] RSP: 002b:00007f9e0c43ba00 EFLAGS: 00010287 [ 741.450704] RAX: 0000000000000000 RBX: 0000000020000040 RCX: 0000000020001010 [ 741.457991] RDX: 0000000000000000 RSI: 00000000000000a8 RDI: 0000000008100000 [ 741.465255] RBP: 000000000075bf20 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 741.472515] R10: 0000000008100000 R11: 0000000000000000 R12: 00007f9e0c43c6d4 [ 741.479779] R13: 00000000004be692 R14: 00000000004e0840 R15: 0000000000000003 [ 741.507206] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 741.529070] loop4: partition table partially beyond EOD, truncated [ 741.541555] Mem-Info: [ 741.547746] active_anon:484204 inactive_anon:713 isolated_anon:0 [ 741.547746] active_file:13133 inactive_file:45985 isolated_file:0 [ 741.547746] unevictable:512 dirty:318 writeback:0 unstable:0 [ 741.547746] slab_reclaimable:16821 slab_unreclaimable:130773 [ 741.547746] mapped:59250 shmem:246 pagetables:10374 bounce:0 [ 741.547746] free:821072 free_pcp:742 free_cma:0 [ 741.592092] loop4: p1 start 119 is beyond EOD, truncated [ 741.597942] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 741.605626] Node 0 active_anon:1451780kB inactive_anon:2832kB active_file:52304kB inactive_file:172484kB unevictable:2048kB isolated(anon):0kB isolated(file):0kB mapped:237000kB dirty:660kB writeback:0kB shmem:948kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 380928kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 741.638406] Node 1 active_anon:485236kB inactive_anon:20kB active_file:228kB inactive_file:11456kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:612kB writeback:0kB shmem:36kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 741.667573] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB active_anon:5400kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 741.695670] lowmem_reserve[]: 0 2555 2557 2557 [ 741.700944] Node 0 DMA32 free:38752kB min:36248kB low:45308kB high:54368kB active_anon:1446380kB inactive_anon:2832kB active_file:52304kB inactive_file:172472kB unevictable:2048kB writepending:660kB present:3129332kB managed:2619972kB mlocked:2048kB kernel_stack:19488kB pagetables:34536kB bounce:0kB free_pcp:1600kB local_pcp:728kB free_cma:0kB [ 741.736330] loop4: p3 size 2 extends beyond EOD, truncated [ 741.745938] loop4: p4 size 32768 extends beyond EOD, truncated [ 741.754072] lowmem_reserve[]: 0 0 2 2 [ 741.758157] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 741.787200] lowmem_reserve[]: [ 741.791567] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 741.798441] 0 0 0 0 [ 741.801541] Node 1 Normal free:3233900kB min:53608kB low:67008kB high:80408kB active_anon:485188kB inactive_anon:20kB active_file:232kB inactive_file:11516kB unevictable:0kB writepending:680kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:3264kB pagetables:6840kB bounce:0kB free_pcp:1624kB local_pcp:1140kB free_cma:0kB [ 741.833879] loop4: p6 size 32768 extends beyond EOD, truncated [ 741.841612] lowmem_reserve[]: 0 0 0 0 [ 741.845685] Node 0 DMA: 2*4kB (ME) 2*8kB (ME) 2*16kB (ME) 2*32kB (UE) 3*64kB (UME) 3*128kB (UME) 2*256kB (UE) 2*512kB (ME) 2*1024kB (UE) 1*2048kB (E) 1*4096kB (M) = 10424kB 19:47:10 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012378000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x86ddffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:10 executing program 3 (fault-call:9 fault-nth:0): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:47:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x4826000000000000}]) [ 741.899751] Node 0 DMA32: 525*4kB (UMEH) 196*8kB (UMH) 289*16kB (UMEH) 241*32kB (UMEH) 38*64kB (UME) 2*128kB (ME) 4*256kB (UE) 2*512kB (U) 1*1024kB (E) 4*2048kB (UME) 2*4096kB (M) = 38148kB 19:47:10 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x900000000000000) [ 741.953260] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 741.980518] Node 1 Normal: 56*4kB (UME) 135*8kB (UME) 4*16kB (U) 5*32kB (UME) 2*64kB (UE) 21*128kB (UM) 6*256kB (UM) 1*512kB (E) 2*1024kB (UM) 1*2048kB (E) 787*4096kB (M) = 3234040kB [ 742.016280] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 742.028805] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 742.044871] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 742.090096] FAULT_INJECTION: forcing a failure. [ 742.090096] name failslab, interval 1, probability 0, space 0, times 0 [ 742.128900] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 742.209355] 59381 total pagecache pages [ 742.219846] 0 pages in swap cache [ 742.231784] CPU: 0 PID: 23576 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 742.236910] Swap cache stats: add 0, delete 0, find 0/0 [ 742.238762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.238769] Call Trace: [ 742.238792] dump_stack+0x172/0x1f0 [ 742.238812] should_fail.cold+0xa/0x1b [ 742.238833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 742.238850] ? lock_downgrade+0x880/0x880 [ 742.238873] __should_failslab+0x121/0x190 [ 742.238892] should_failslab+0x9/0x14 [ 742.250640] Free swap = 0kB [ 742.253630] kmem_cache_alloc_node+0x26c/0x710 [ 742.253659] __alloc_skb+0xd5/0x5f0 [ 742.253677] ? skb_scrub_packet+0x490/0x490 [ 742.253697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.253714] ? netlink_autobind.isra.0+0x228/0x310 [ 742.253735] netlink_sendmsg+0x97b/0xd70 [ 742.253757] ? netlink_unicast+0x720/0x720 [ 742.256548] Total swap = 0kB [ 742.259981] ? selinux_socket_sendmsg+0x36/0x40 [ 742.259996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.260011] ? security_socket_sendmsg+0x8d/0xc0 [ 742.260024] ? netlink_unicast+0x720/0x720 [ 742.260041] sock_sendmsg+0xd7/0x130 [ 742.260058] ___sys_sendmsg+0x3e2/0x920 [ 742.260076] ? copy_msghdr_from_user+0x430/0x430 [ 742.260097] ? lock_downgrade+0x880/0x880 [ 742.260113] ? kasan_check_read+0x11/0x20 [ 742.260131] ? __fget+0x367/0x540 [ 742.260149] ? iterate_fd+0x360/0x360 [ 742.260167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.260181] ? proc_fail_nth_write+0x9d/0x1e0 [ 742.260196] ? __fget_light+0x1a9/0x230 [ 742.260210] ? __fdget+0x1b/0x20 [ 742.260224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.260237] ? sockfd_lookup_light+0xcb/0x180 [ 742.260253] __sys_sendmmsg+0x1bf/0x4e0 [ 742.260275] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 742.267872] 1965979 pages RAM [ 742.269255] ? kasan_check_write+0x14/0x20 [ 742.269286] ? __sb_end_write+0xd9/0x110 [ 742.269306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.269321] ? fput+0x128/0x1a0 [ 742.269337] ? ksys_write+0x1f1/0x2d0 [ 742.269359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.277718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.277735] ? do_syscall_64+0x26/0x620 [ 742.277750] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.277764] ? do_syscall_64+0x26/0x620 [ 742.277786] __x64_sys_sendmmsg+0x9d/0x100 [ 742.277802] do_syscall_64+0xfd/0x620 [ 742.277820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.289203] RIP: 0033:0x459a29 [ 742.289219] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.289228] RSP: 002b:00007fb39f935c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 742.289243] RAX: ffffffffffffffda RBX: 00007fb39f935c90 RCX: 0000000000459a29 [ 742.289252] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 742.289260] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 742.289269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9366d4 [ 742.289277] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 742.352274] 0 pages HighMem/MovableOnly [ 742.399862] 338856 pages reserved [ 742.415301] 0 pages cma reserved [ 742.446857] Out of memory: Kill process 9483 (syz-executor.1) score 1006 or sacrifice child [ 742.477419] Killed process 9483 (syz-executor.1) total-vm:60560kB, anon-rss:6200kB, file-rss:34816kB, shmem-rss:0kB [ 742.573649] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 742.578400] loop4: partition table partially beyond EOD, truncated [ 742.592121] loop4: p1 start 120 is beyond EOD, truncated 19:47:11 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x88470000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x5009000000000000}]) 19:47:11 executing program 3 (fault-call:9 fault-nth:1): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 742.611647] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 742.639230] loop4: p3 size 2 extends beyond EOD, truncated 19:47:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x88480000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:11 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa00000000000000) [ 742.671391] loop4: p4 size 32768 extends beyond EOD, truncated [ 742.733543] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 742.744950] FAULT_INJECTION: forcing a failure. [ 742.744950] name failslab, interval 1, probability 0, space 0, times 0 [ 742.776158] loop4: p6 size 32768 extends beyond EOD, truncated [ 742.795171] CPU: 0 PID: 23598 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 742.802157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.811514] Call Trace: [ 742.811538] dump_stack+0x172/0x1f0 [ 742.811563] should_fail.cold+0xa/0x1b [ 742.811583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 742.811600] ? lock_downgrade+0x880/0x880 [ 742.811623] __should_failslab+0x121/0x190 [ 742.811640] should_failslab+0x9/0x14 [ 742.811657] kmem_cache_alloc_node_trace+0x274/0x720 [ 742.811673] ? __alloc_skb+0xd5/0x5f0 [ 742.811696] __kmalloc_node_track_caller+0x3d/0x80 [ 742.811714] __kmalloc_reserve.isra.0+0x40/0xf0 [ 742.811729] __alloc_skb+0x10b/0x5f0 [ 742.811744] ? skb_scrub_packet+0x490/0x490 [ 742.811761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.811774] ? netlink_autobind.isra.0+0x228/0x310 [ 742.811791] netlink_sendmsg+0x97b/0xd70 [ 742.811808] ? netlink_unicast+0x720/0x720 [ 742.811825] ? selinux_socket_sendmsg+0x36/0x40 [ 742.811842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.839208] ? security_socket_sendmsg+0x8d/0xc0 [ 742.839225] ? netlink_unicast+0x720/0x720 [ 742.839243] sock_sendmsg+0xd7/0x130 [ 742.839260] ___sys_sendmsg+0x3e2/0x920 [ 742.839278] ? copy_msghdr_from_user+0x430/0x430 [ 742.839297] ? lock_downgrade+0x880/0x880 [ 742.839316] ? kasan_check_read+0x11/0x20 19:47:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x581b000000000000}]) [ 742.853132] ? __fget+0x367/0x540 [ 742.853154] ? iterate_fd+0x360/0x360 [ 742.853174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.861558] ? proc_fail_nth_write+0x9d/0x1e0 [ 742.861580] ? __fget_light+0x1a9/0x230 [ 742.861596] ? __fdget+0x1b/0x20 [ 742.861612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.861626] ? sockfd_lookup_light+0xcb/0x180 [ 742.861641] __sys_sendmmsg+0x1bf/0x4e0 [ 742.861660] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 742.861680] ? kasan_check_write+0x14/0x20 [ 742.861710] ? __sb_end_write+0xd9/0x110 [ 742.861729] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.861740] ? fput+0x128/0x1a0 [ 742.861755] ? ksys_write+0x1f1/0x2d0 [ 742.861774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.861788] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.861800] ? do_syscall_64+0x26/0x620 [ 742.861817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.871656] ? do_syscall_64+0x26/0x620 [ 742.871676] __x64_sys_sendmmsg+0x9d/0x100 [ 742.871695] do_syscall_64+0xfd/0x620 [ 742.871715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.871726] RIP: 0033:0x459a29 [ 742.871742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.871750] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 742.871766] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 742.871775] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 742.871783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 742.871790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 742.871798] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:11 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500012379000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x88640000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:11 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:47:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6000000000000000}]) 19:47:11 executing program 3 (fault-call:9 fault-nth:2): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:47:11 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb00000000000000) 19:47:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x88a8ffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 743.495994] FAULT_INJECTION: forcing a failure. [ 743.495994] name failslab, interval 1, probability 0, space 0, times 0 [ 743.527120] CPU: 1 PID: 23788 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 743.534147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.543538] Call Trace: [ 743.546140] dump_stack+0x172/0x1f0 [ 743.549785] should_fail.cold+0xa/0x1b [ 743.549806] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 743.549820] ? lock_downgrade+0x880/0x880 [ 743.549843] __should_failslab+0x121/0x190 [ 743.549868] should_failslab+0x9/0x14 [ 743.571155] kmem_cache_alloc_trace+0x2cc/0x760 [ 743.575843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.581402] ? security_capable+0x92/0xc0 [ 743.585576] tcf_chain_create+0x51/0x2c0 [ 743.589743] ? sfb_tcf_block+0x52/0x80 [ 743.593627] __tcf_chain_get+0x1e0/0x260 [ 743.597682] tc_new_tfilter+0x414/0x1790 [ 743.601752] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 743.606157] ? tc_del_tfilter+0xe60/0xe60 [ 743.610308] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 743.614731] ? mutex_trylock+0x1e0/0x1e0 [ 743.618789] ? find_held_lock+0x35/0x130 [ 743.622852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 743.628484] ? tc_del_tfilter+0xe60/0xe60 [ 743.632810] rtnetlink_rcv_msg+0x463/0xb00 [ 743.637045] ? rtnetlink_put_metrics+0x560/0x560 [ 743.641890] ? netlink_deliver_tap+0x22d/0xc20 [ 743.647423] ? find_held_lock+0x35/0x130 [ 743.651492] netlink_rcv_skb+0x17d/0x460 [ 743.655553] ? rtnetlink_put_metrics+0x560/0x560 [ 743.660309] ? netlink_ack+0xb30/0xb30 [ 743.664191] ? kasan_check_read+0x11/0x20 [ 743.668330] ? netlink_deliver_tap+0x254/0xc20 [ 743.672910] rtnetlink_rcv+0x1d/0x30 [ 743.676637] netlink_unicast+0x537/0x720 [ 743.680715] ? netlink_attachskb+0x770/0x770 [ 743.685156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.690711] netlink_sendmsg+0x8ae/0xd70 [ 743.694878] ? netlink_unicast+0x720/0x720 [ 743.699106] ? selinux_socket_sendmsg+0x36/0x40 [ 743.703770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.709302] ? security_socket_sendmsg+0x8d/0xc0 [ 743.714063] ? netlink_unicast+0x720/0x720 [ 743.718315] sock_sendmsg+0xd7/0x130 [ 743.722029] ___sys_sendmsg+0x3e2/0x920 [ 743.726009] ? copy_msghdr_from_user+0x430/0x430 [ 743.730758] ? lock_downgrade+0x880/0x880 [ 743.734900] ? kasan_check_read+0x11/0x20 [ 743.739053] ? __fget+0x367/0x540 [ 743.742519] ? iterate_fd+0x360/0x360 [ 743.746331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 743.754569] ? proc_fail_nth_write+0x9d/0x1e0 [ 743.759076] ? __fget_light+0x1a9/0x230 [ 743.763059] ? __fdget+0x1b/0x20 [ 743.766421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 743.771968] ? sockfd_lookup_light+0xcb/0x180 [ 743.776466] __sys_sendmmsg+0x1bf/0x4e0 [ 743.780456] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 743.784805] ? kasan_check_write+0x14/0x20 [ 743.789035] ? __sb_end_write+0xd9/0x110 [ 743.793100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 743.798626] ? fput+0x128/0x1a0 [ 743.801895] ? ksys_write+0x1f1/0x2d0 [ 743.805689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.810443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.815213] ? do_syscall_64+0x26/0x620 [ 743.819177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.824540] ? do_syscall_64+0x26/0x620 [ 743.828521] __x64_sys_sendmmsg+0x9d/0x100 [ 743.832760] do_syscall_64+0xfd/0x620 [ 743.836555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.841731] RIP: 0033:0x459a29 [ 743.844924] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.863846] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 743.871546] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 743.878801] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 743.886059] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x6810000000000000}]) 19:47:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x88caffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:12 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00000000000000) 19:47:12 executing program 3 (fault-call:9 fault-nth:3): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 743.893320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 743.900588] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 743.965174] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 743.983956] loop2: partition table partially beyond EOD, truncated [ 744.019197] loop2: p1 size 2 extends beyond EOD, truncated [ 744.028881] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 744.051155] loop4: partition table partially beyond EOD, truncated [ 744.073881] loop2: p1 could not be added: 12 [ 744.087480] loop4: p1 start 121 is beyond EOD, truncated [ 744.101571] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 744.109388] loop4: p3 size 2 extends beyond EOD, truncated [ 744.114206] loop2: p2 size 1073741824 extends beyond EOD, truncated 19:47:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x89060000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 744.130757] loop4: p4 size 32768 extends beyond EOD, truncated [ 744.138100] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 744.146749] loop4: p6 size 32768 extends beyond EOD, truncated [ 744.163824] loop2: p4 size 32768 extends beyond EOD, truncated [ 744.215512] FAULT_INJECTION: forcing a failure. [ 744.215512] name failslab, interval 1, probability 0, space 0, times 0 [ 744.228216] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 744.259857] CPU: 1 PID: 23897 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 744.266871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.276230] Call Trace: [ 744.276252] dump_stack+0x172/0x1f0 [ 744.276274] should_fail.cold+0xa/0x1b [ 744.286396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 744.291524] ? lock_downgrade+0x880/0x880 [ 744.295702] __should_failslab+0x121/0x190 [ 744.299958] should_failslab+0x9/0x14 [ 744.299974] kmem_cache_alloc_node+0x26c/0x710 [ 744.299990] ? __lock_is_held+0xb6/0x140 [ 744.300010] __alloc_skb+0xd5/0x5f0 [ 744.316076] ? skb_scrub_packet+0x490/0x490 [ 744.316093] ? kmem_cache_alloc_trace+0x348/0x760 [ 744.325257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.330818] ? security_capable+0x92/0xc0 [ 744.334989] tc_chain_notify+0xcf/0x200 [ 744.338982] __tcf_chain_get+0x210/0x260 [ 744.343069] tc_new_tfilter+0x414/0x1790 [ 744.347144] ? tc_del_tfilter+0xe60/0xe60 [ 744.347163] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 744.347182] ? mutex_trylock+0x1e0/0x1e0 [ 744.359803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 744.365358] ? tc_del_tfilter+0xe60/0xe60 [ 744.369512] rtnetlink_rcv_msg+0x463/0xb00 [ 744.369533] ? rtnetlink_put_metrics+0x560/0x560 [ 744.369555] ? netlink_deliver_tap+0x22d/0xc20 [ 744.383107] ? find_held_lock+0x35/0x130 [ 744.387189] netlink_rcv_skb+0x17d/0x460 [ 744.391264] ? rtnetlink_put_metrics+0x560/0x560 [ 744.391283] ? netlink_ack+0xb30/0xb30 [ 744.391299] ? kasan_check_read+0x11/0x20 [ 744.391320] ? netlink_deliver_tap+0x254/0xc20 [ 744.391338] rtnetlink_rcv+0x1d/0x30 [ 744.398953] loop2: p6 size 32768 extends beyond EOD, [ 744.400224] netlink_unicast+0x537/0x720 [ 744.400243] ? netlink_attachskb+0x770/0x770 [ 744.400264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.400283] netlink_sendmsg+0x8ae/0xd70 [ 744.400302] ? netlink_unicast+0x720/0x720 [ 744.400321] ? selinux_socket_sendmsg+0x36/0x40 [ 744.408967] truncated [ 744.409062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.417942] ? security_socket_sendmsg+0x8d/0xc0 [ 744.417960] ? netlink_unicast+0x720/0x720 [ 744.417975] sock_sendmsg+0xd7/0x130 [ 744.417991] ___sys_sendmsg+0x3e2/0x920 [ 744.426440] ? copy_msghdr_from_user+0x430/0x430 [ 744.426464] ? lock_downgrade+0x880/0x880 [ 744.426483] ? kasan_check_read+0x11/0x20 [ 744.436081] ? __fget+0x367/0x540 [ 744.436102] ? iterate_fd+0x360/0x360 [ 744.436119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 744.436134] ? proc_fail_nth_write+0x9d/0x1e0 [ 744.445043] ? __fget_light+0x1a9/0x230 [ 744.445062] ? __fdget+0x1b/0x20 [ 744.445076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 744.445093] ? sockfd_lookup_light+0xcb/0x180 [ 744.453059] __sys_sendmmsg+0x1bf/0x4e0 [ 744.453081] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 744.453099] ? kasan_check_write+0x14/0x20 [ 744.453129] ? __sb_end_write+0xd9/0x110 [ 744.453146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 744.453163] ? fput+0x128/0x1a0 [ 744.462134] ? ksys_write+0x1f1/0x2d0 [ 744.462156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.462172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.462185] ? do_syscall_64+0x26/0x620 [ 744.462200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.462212] ? do_syscall_64+0x26/0x620 [ 744.462231] __x64_sys_sendmmsg+0x9d/0x100 [ 744.573904] do_syscall_64+0xfd/0x620 [ 744.578611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.583830] RIP: 0033:0x459a29 [ 744.587024] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:47:12 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001237a000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7605000000000000}]) 19:47:13 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:47:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x8dffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xf5ffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 744.606051] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 744.614224] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 744.621518] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 744.628809] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 744.636101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 744.643398] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:13 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe00000000000000) 19:47:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xff000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x7805000000000000}]) 19:47:13 executing program 3 (fault-call:9 fault-nth:4): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:47:13 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001237b000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:13 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r2, 0x1, [], r4, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x1, r5}) 19:47:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x8000000000000000}]) 19:47:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xffffa888]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 745.072063] FAULT_INJECTION: forcing a failure. [ 745.072063] name failslab, interval 1, probability 0, space 0, times 0 [ 745.161361] CPU: 1 PID: 24070 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 745.168357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.172646] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 745.177733] Call Trace: [ 745.177759] dump_stack+0x172/0x1f0 [ 745.177786] should_fail.cold+0xa/0x1b [ 745.192374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 745.197523] ? lock_downgrade+0x880/0x880 [ 745.201695] __should_failslab+0x121/0x190 [ 745.203312] loop4: partition table partially beyond EOD, [ 745.205950] should_failslab+0x9/0x14 [ 745.205966] kmem_cache_alloc_node_trace+0x274/0x720 [ 745.205985] ? __alloc_skb+0xd5/0x5f0 [ 745.213642] truncated [ 745.215323] __kmalloc_node_track_caller+0x3d/0x80 [ 745.215346] __kmalloc_reserve.isra.0+0x40/0xf0 [ 745.224233] __alloc_skb+0x10b/0x5f0 [ 745.224249] ? skb_scrub_packet+0x490/0x490 [ 745.224265] ? kmem_cache_alloc_trace+0x348/0x760 [ 745.231587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.231605] ? security_capable+0x92/0xc0 [ 745.231625] tc_chain_notify+0xcf/0x200 [ 745.231643] __tcf_chain_get+0x210/0x260 [ 745.236511] loop4: p1 start 123 is beyond EOD, [ 745.239998] tc_new_tfilter+0x414/0x1790 [ 745.240023] ? tc_del_tfilter+0xe60/0xe60 [ 745.240037] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 745.240056] ? mutex_trylock+0x1e0/0x1e0 [ 745.244422] truncated [ 745.249190] ? find_held_lock+0x35/0x130 [ 745.249223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 745.254827] loop4: p2 size 1073741824 extends beyond EOD, [ 745.258870] ? tc_del_tfilter+0xe60/0xe60 [ 745.258886] rtnetlink_rcv_msg+0x463/0xb00 [ 745.258904] ? rtnetlink_put_metrics+0x560/0x560 [ 745.262930] truncated [ 745.266906] ? netlink_deliver_tap+0x22d/0xc20 [ 745.266920] ? find_held_lock+0x35/0x130 [ 745.266938] netlink_rcv_skb+0x17d/0x460 [ 745.275656] ? rtnetlink_put_metrics+0x560/0x560 [ 745.275673] ? netlink_ack+0xb30/0xb30 [ 745.275690] ? kasan_check_read+0x11/0x20 [ 745.284239] ? netlink_deliver_tap+0x254/0xc20 [ 745.284261] rtnetlink_rcv+0x1d/0x30 [ 745.290700] netlink_unicast+0x537/0x720 19:47:13 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xffffca88]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 745.290719] ? netlink_attachskb+0x770/0x770 [ 745.290739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.290756] netlink_sendmsg+0x8ae/0xd70 [ 745.300326] ? netlink_unicast+0x720/0x720 [ 745.300348] ? selinux_socket_sendmsg+0x36/0x40 [ 745.300360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.300375] ? security_socket_sendmsg+0x8d/0xc0 [ 745.310129] ? netlink_unicast+0x720/0x720 [ 745.310146] sock_sendmsg+0xd7/0x130 [ 745.310162] ___sys_sendmsg+0x3e2/0x920 [ 745.310178] ? copy_msghdr_from_user+0x430/0x430 [ 745.319143] ? lock_downgrade+0x880/0x880 [ 745.319160] ? kasan_check_read+0x11/0x20 [ 745.319178] ? __fget+0x367/0x540 [ 745.321808] loop4: p3 size 2 extends beyond EOD, [ 745.326171] ? iterate_fd+0x360/0x360 [ 745.326188] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 745.326203] ? proc_fail_nth_write+0x9d/0x1e0 [ 745.330331] truncated [ 745.334298] ? __fget_light+0x1a9/0x230 [ 745.334312] ? __fdget+0x1b/0x20 [ 745.334329] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 745.342940] ? sockfd_lookup_light+0xcb/0x180 19:47:14 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf00000000000000) [ 745.342957] __sys_sendmmsg+0x1bf/0x4e0 [ 745.342977] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 745.342995] ? kasan_check_write+0x14/0x20 [ 745.351878] ? __sb_end_write+0xd9/0x110 [ 745.351896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 745.351907] ? fput+0x128/0x1a0 [ 745.351922] ? ksys_write+0x1f1/0x2d0 [ 745.359673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.359688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.359701] ? do_syscall_64+0x26/0x620 [ 745.359719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.369627] ? do_syscall_64+0x26/0x620 [ 745.369648] __x64_sys_sendmmsg+0x9d/0x100 [ 745.369664] do_syscall_64+0xfd/0x620 [ 745.369682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.377936] RIP: 0033:0x459a29 [ 745.377952] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.377963] RSP: 002b:00007fb39f956c78 EFLAGS: 00000246 19:47:14 executing program 3 (fault-call:9 fault-nth:5): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 745.388127] ORIG_RAX: 0000000000000133 [ 745.388136] RAX: ffffffffffffffda RBX: 00007fb39f956c90 RCX: 0000000000459a29 [ 745.388145] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 745.388153] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 745.388165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9576d4 [ 745.393110] loop4: p4 size 32768 extends beyond EOD, [ 745.397139] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xffffdd86]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 745.663594] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 745.679641] truncated [ 745.681555] loop2: partition table partially beyond EOD, truncated [ 745.693786] loop2: p1 size 2 extends beyond EOD, truncated [ 745.705034] loop2: p2 size 1073741824 extends beyond EOD, truncated 19:47:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x883a000000000000}]) [ 745.726346] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 745.748001] loop2: p4 size 32768 extends beyond EOD, truncated [ 745.782629] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 745.809345] loop2: p6 size 32768 extends beyond EOD, truncated [ 745.811423] FAULT_INJECTION: forcing a failure. [ 745.811423] name failslab, interval 1, probability 0, space 0, times 0 [ 745.874798] CPU: 1 PID: 24201 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 745.881807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.891185] Call Trace: [ 745.893785] dump_stack+0x172/0x1f0 [ 745.897430] should_fail.cold+0xa/0x1b [ 745.901329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 745.906516] ? save_stack+0x45/0xd0 [ 745.910131] ? kasan_kmalloc+0xce/0xf0 [ 745.914009] ? __kmalloc_node_track_caller+0x51/0x80 [ 745.919102] ? __kmalloc_reserve.isra.0+0x40/0xf0 [ 745.923929] ? __alloc_skb+0x10b/0x5f0 [ 745.927809] ? tc_chain_notify+0xcf/0x200 [ 745.931954] __should_failslab+0x121/0x190 [ 745.936183] should_failslab+0x9/0x14 [ 745.939978] kmem_cache_alloc_node_trace+0x5a/0x720 [ 745.944987] ? __lock_is_held+0xb6/0x140 [ 745.949034] ? should_fail+0x14d/0x85c [ 745.952928] __kmalloc_node_track_caller+0x3d/0x80 [ 745.957849] __kmalloc_reserve.isra.0+0x40/0xf0 [ 745.962512] pskb_expand_head+0x154/0xe20 [ 745.966646] ? skb_put+0x183/0x1e0 [ 745.970177] ? memset+0x32/0x40 [ 745.973448] ? memcpy+0x46/0x50 [ 745.976722] netlink_trim+0x215/0x260 [ 745.980528] netlink_broadcast_filtered+0x64/0xb20 [ 745.985450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.990986] netlink_broadcast+0x3a/0x50 [ 745.995037] rtnetlink_send+0xa1/0x110 [ 745.998915] tc_chain_notify+0x151/0x200 [ 746.002981] __tcf_chain_get+0x210/0x260 [ 746.007036] tc_new_tfilter+0x414/0x1790 [ 746.011085] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 746.015492] ? tc_del_tfilter+0xe60/0xe60 [ 746.019629] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 746.024044] ? mutex_trylock+0x1e0/0x1e0 [ 746.028115] ? find_held_lock+0x35/0x130 [ 746.032197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.037722] ? tc_del_tfilter+0xe60/0xe60 [ 746.041860] rtnetlink_rcv_msg+0x463/0xb00 [ 746.046086] ? rtnetlink_put_metrics+0x560/0x560 [ 746.050842] ? netlink_deliver_tap+0x22d/0xc20 [ 746.055418] ? find_held_lock+0x35/0x130 [ 746.059470] netlink_rcv_skb+0x17d/0x460 [ 746.063521] ? rtnetlink_put_metrics+0x560/0x560 [ 746.068270] ? netlink_ack+0xb30/0xb30 [ 746.072161] ? kasan_check_read+0x11/0x20 [ 746.076302] ? netlink_deliver_tap+0x254/0xc20 [ 746.080884] rtnetlink_rcv+0x1d/0x30 [ 746.084596] netlink_unicast+0x537/0x720 [ 746.088650] ? netlink_attachskb+0x770/0x770 [ 746.093051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.098581] netlink_sendmsg+0x8ae/0xd70 [ 746.102651] ? netlink_unicast+0x720/0x720 [ 746.106893] ? selinux_socket_sendmsg+0x36/0x40 [ 746.111553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.117083] ? security_socket_sendmsg+0x8d/0xc0 [ 746.121827] ? netlink_unicast+0x720/0x720 [ 746.126055] sock_sendmsg+0xd7/0x130 [ 746.129772] ___sys_sendmsg+0x3e2/0x920 [ 746.133737] ? copy_msghdr_from_user+0x430/0x430 [ 746.138500] ? lock_downgrade+0x880/0x880 [ 746.142640] ? kasan_check_read+0x11/0x20 [ 746.146781] ? __fget+0x367/0x540 [ 746.150226] ? iterate_fd+0x360/0x360 [ 746.154032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.159576] ? proc_fail_nth_write+0x9d/0x1e0 [ 746.164074] ? __fget_light+0x1a9/0x230 [ 746.168037] ? __fdget+0x1b/0x20 [ 746.171394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.176919] ? sockfd_lookup_light+0xcb/0x180 [ 746.181421] __sys_sendmmsg+0x1bf/0x4e0 [ 746.185389] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 746.189703] ? kasan_check_write+0x14/0x20 [ 746.193934] ? __sb_end_write+0xd9/0x110 [ 746.197990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.203531] ? fput+0x128/0x1a0 [ 746.206802] ? ksys_write+0x1f1/0x2d0 [ 746.210609] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.215356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.220105] ? do_syscall_64+0x26/0x620 [ 746.224075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.229425] ? do_syscall_64+0x26/0x620 [ 746.233393] __x64_sys_sendmmsg+0x9d/0x100 [ 746.237632] do_syscall_64+0xfd/0x620 [ 746.241441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.246618] RIP: 0033:0x459a29 [ 746.249820] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.268708] RSP: 002b:00007fb39f956c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 19:47:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xfffff000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:14 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x802) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000240)=0x60) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r2) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000340)={r1, r2, 0x6, 0xbc, &(0x7f0000000280)="1b25cdf118d30b49a4e8d393b68b0e739350bd97f22a7d9d9292dc110c343d87ee61843a7c798a9da007c80dbf94129c57d771dd85c5626de3ed1c96a0c6d93e939ac58e45cd775154bf171b4f2aa598d10e4312c8654b50449c567b2fecad53352a368246d9a0b0868ddd6f752f8da7ca6307fd5f4b71dba10d2f7ac6ffcf2bc8a89c894e0636a9563a8f13a47e17208ac0b9dc94f6500d8e4ed275506fd412a4b3a609486dff0bf7a988a9d3cdd1cec6d4d42839212203b1ebaec0", 0x77, 0x7, 0x9ef, 0x2bf0, 0x280, 0x1, 0x7, 'syz0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r5 = fcntl$dupfd(r4, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 746.276410] RAX: ffffffffffffffda RBX: 00007fb39f956c90 RCX: 0000000000459a29 [ 746.283670] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 746.290927] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 746.298190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9576d4 [ 746.305447] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:14 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xffffff8d]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 746.342170] loop4: p6 size 32768 extends beyond EOD, truncated 19:47:15 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001237c000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0x982f000000000000}]) 19:47:15 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1000000000000000) 19:47:15 executing program 3 (fault-call:9 fault-nth:6): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:47:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xfffffff5]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xa824000000000000}]) 19:47:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xf0ffffffffffff]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 746.831614] FAULT_INJECTION: forcing a failure. [ 746.831614] name failslab, interval 1, probability 0, space 0, times 0 [ 746.931753] CPU: 0 PID: 24254 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 746.938756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.948130] Call Trace: [ 746.950747] dump_stack+0x172/0x1f0 [ 746.954403] should_fail.cold+0xa/0x1b [ 746.958328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 746.963463] ? lock_downgrade+0x880/0x880 [ 746.967644] __should_failslab+0x121/0x190 [ 746.971902] should_failslab+0x9/0x14 [ 746.975717] kmem_cache_alloc_trace+0x2cc/0x760 [ 746.980403] ? lockdep_rtnl_is_held+0x26/0x30 [ 746.984917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.990477] tc_new_tfilter+0x93c/0x1790 [ 746.990505] ? tc_del_tfilter+0xe60/0xe60 [ 746.990524] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 746.990546] ? mutex_trylock+0x1e0/0x1e0 [ 746.990580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.990594] ? tc_del_tfilter+0xe60/0xe60 [ 746.990610] rtnetlink_rcv_msg+0x463/0xb00 [ 746.990629] ? rtnetlink_put_metrics+0x560/0x560 [ 746.990651] ? netlink_deliver_tap+0x22d/0xc20 [ 746.990668] ? find_held_lock+0x35/0x130 [ 746.990686] netlink_rcv_skb+0x17d/0x460 [ 746.990700] ? rtnetlink_put_metrics+0x560/0x560 [ 746.990714] ? netlink_ack+0xb30/0xb30 [ 746.990730] ? kasan_check_read+0x11/0x20 [ 746.990748] ? netlink_deliver_tap+0x254/0xc20 [ 747.003385] rtnetlink_rcv+0x1d/0x30 [ 747.003402] netlink_unicast+0x537/0x720 [ 747.003421] ? netlink_attachskb+0x770/0x770 [ 747.003443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.003462] netlink_sendmsg+0x8ae/0xd70 [ 747.003483] ? netlink_unicast+0x720/0x720 19:47:15 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x100000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 747.003504] ? selinux_socket_sendmsg+0x36/0x40 [ 747.087085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.092647] ? security_socket_sendmsg+0x8d/0xc0 [ 747.097431] ? netlink_unicast+0x720/0x720 [ 747.101692] sock_sendmsg+0xd7/0x130 [ 747.105522] ___sys_sendmsg+0x3e2/0x920 [ 747.109787] ? copy_msghdr_from_user+0x430/0x430 [ 747.114568] ? lock_downgrade+0x880/0x880 [ 747.118737] ? kasan_check_read+0x11/0x20 [ 747.122895] ? __fget+0x367/0x540 [ 747.126372] ? iterate_fd+0x360/0x360 [ 747.130196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.135741] ? proc_fail_nth_write+0x9d/0x1e0 [ 747.140249] ? __fget_light+0x1a9/0x230 [ 747.144224] ? __fdget+0x1b/0x20 [ 747.147580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.153134] ? sockfd_lookup_light+0xcb/0x180 [ 747.160176] __sys_sendmmsg+0x1bf/0x4e0 [ 747.164176] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 747.168501] ? kasan_check_write+0x14/0x20 [ 747.172760] ? __sb_end_write+0xd9/0x110 [ 747.176826] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.182411] ? fput+0x128/0x1a0 [ 747.185734] ? ksys_write+0x1f1/0x2d0 [ 747.189532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.194290] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.199302] ? do_syscall_64+0x26/0x620 [ 747.203272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.208629] ? do_syscall_64+0x26/0x620 [ 747.212745] __x64_sys_sendmmsg+0x9d/0x100 [ 747.217006] do_syscall_64+0xfd/0x620 [ 747.220832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.226032] RIP: 0033:0x459a29 [ 747.229318] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.248234] RSP: 002b:00007fb39f935c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 747.255987] RAX: ffffffffffffffda RBX: 00007fb39f935c90 RCX: 0000000000459a29 [ 747.263266] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 747.270547] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 19:47:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xaa05000000000000}]) [ 747.277953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9366d4 [ 747.285225] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:15 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1400000000000000) [ 747.363281] loop4: p1 < > p2 p3 < p5 p6 > p4 19:47:15 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x380, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f00000000c0)={{0xed, 0x3}, 'port0\x00', 0x0, 0x807, 0x7, 0x8, 0x0, 0x9, 0x9, 0x0, 0x2, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:15 executing program 3 (fault-call:9 fault-nth:7): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 747.388838] loop4: partition table partially beyond EOD, truncated [ 747.418361] loop4: p1 start 124 is beyond EOD, truncated [ 747.479956] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 747.501169] loop4: p3 size 2 extends beyond EOD, truncated [ 747.551984] loop4: p4 size 32768 extends beyond EOD, truncated [ 747.586029] FAULT_INJECTION: forcing a failure. [ 747.586029] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.634424] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 747.641827] CPU: 0 PID: 24396 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 747.648796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.658166] Call Trace: [ 747.660784] dump_stack+0x172/0x1f0 [ 747.664448] should_fail.cold+0xa/0x1b [ 747.668352] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.673486] ? __might_sleep+0x95/0x190 [ 747.677477] __alloc_pages_nodemask+0x1ee/0x750 [ 747.682163] ? __alloc_pages_slowpath+0x2870/0x2870 [ 747.687186] ? retint_kernel+0x2d/0x2d [ 747.687219] cache_grow_begin+0x91/0x8c0 [ 747.687238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.687254] ? __cpuset_node_allowed+0x136/0x540 [ 747.687272] fallback_alloc+0x1fd/0x2d0 [ 747.687308] ____cache_alloc_node+0x1be/0x1e0 [ 747.695306] kmem_cache_alloc_node_trace+0xec/0x720 [ 747.695334] __kmalloc_node_track_caller+0x3d/0x80 [ 747.695354] __kmalloc_reserve.isra.0+0x40/0xf0 [ 747.695372] __alloc_skb+0x10b/0x5f0 [ 747.695389] ? skb_scrub_packet+0x490/0x490 [ 747.695401] ? kmem_cache_alloc_trace+0x348/0x760 [ 747.695420] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 747.709663] tc_chain_notify+0xcf/0x200 [ 747.709683] __tcf_chain_get+0x210/0x260 [ 747.709703] tc_new_tfilter+0x414/0x1790 [ 747.709718] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 747.709743] ? tc_del_tfilter+0xe60/0xe60 [ 747.709759] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 747.709780] ? mutex_trylock+0x1e0/0x1e0 [ 747.709796] ? find_held_lock+0x35/0x130 [ 747.709832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.709846] ? tc_del_tfilter+0xe60/0xe60 [ 747.709858] rtnetlink_rcv_msg+0x463/0xb00 [ 747.709875] ? rtnetlink_put_metrics+0x560/0x560 [ 747.709898] ? netlink_deliver_tap+0x22d/0xc20 [ 747.719414] ? find_held_lock+0x35/0x130 [ 747.719437] netlink_rcv_skb+0x17d/0x460 [ 747.719454] ? rtnetlink_put_metrics+0x560/0x560 [ 747.719471] ? netlink_ack+0xb30/0xb30 [ 747.719489] ? kasan_check_read+0x11/0x20 [ 747.719511] ? netlink_deliver_tap+0x254/0xc20 [ 747.719530] rtnetlink_rcv+0x1d/0x30 [ 747.719545] netlink_unicast+0x537/0x720 [ 747.732834] ? netlink_attachskb+0x770/0x770 [ 747.732857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.732876] netlink_sendmsg+0x8ae/0xd70 [ 747.732898] ? netlink_unicast+0x720/0x720 [ 747.732923] ? selinux_socket_sendmsg+0x36/0x40 [ 747.742064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.742080] ? security_socket_sendmsg+0x8d/0xc0 [ 747.742095] ? netlink_unicast+0x720/0x720 [ 747.742111] sock_sendmsg+0xd7/0x130 [ 747.742128] ___sys_sendmsg+0x3e2/0x920 [ 747.742146] ? copy_msghdr_from_user+0x430/0x430 [ 747.742166] ? lock_downgrade+0x880/0x880 [ 747.742183] ? kasan_check_read+0x11/0x20 [ 747.742202] ? __fget+0x367/0x540 [ 747.742223] ? iterate_fd+0x360/0x360 [ 747.742241] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.742256] ? proc_fail_nth_write+0x9d/0x1e0 [ 747.742275] ? __fget_light+0x1a9/0x230 [ 747.742291] ? __fdget+0x1b/0x20 [ 747.742304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.742318] ? sockfd_lookup_light+0xcb/0x180 [ 747.742332] __sys_sendmmsg+0x1bf/0x4e0 [ 747.742352] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 747.742369] ? kasan_check_write+0x14/0x20 [ 747.742391] ? __sb_end_write+0xd9/0x110 [ 747.742411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.754916] loop4: p6 size 32768 extends beyond EOD, [ 747.755625] ? fput+0x128/0x1a0 [ 747.755643] ? ksys_write+0x1f1/0x2d0 [ 747.755661] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.755673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.755689] ? do_syscall_64+0x26/0x620 [ 747.761360] truncated [ 747.764149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.764165] ? do_syscall_64+0x26/0x620 [ 747.764187] __x64_sys_sendmmsg+0x9d/0x100 [ 747.764206] do_syscall_64+0xfd/0x620 [ 747.764227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.764239] RIP: 0033:0x459a29 [ 747.764255] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.764264] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 747.764282] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 747.772816] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 747.772825] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.772835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 747.772843] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 747.875169] loop2: p1 < > p2 p3 < p5 p6 > p4 19:47:16 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="0201050001237d000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x200000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb036000000000000}]) 19:47:16 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3103000000000000) 19:47:16 executing program 3 (fault-call:9 fault-nth:8): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 747.908897] loop2: partition table partially beyond EOD, [ 747.974050] truncated [ 748.092917] loop2: p1 size 2 extends beyond EOD, truncated [ 748.099824] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 748.107589] loop2: p4 size 32768 extends beyond EOD, truncated [ 748.126492] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 748.174041] loop2: p6 size 32768 extends beyond EOD, [ 748.180401] truncated 19:47:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x300000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:16 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x3, 0x20) msgrcv(r1, &(0x7f0000000240)={0x0, ""/133}, 0x8d, 0x3, 0x2000) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000000f2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xd6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x3, 0xfff, 0x7, 0x458, r3, 0x1, [], r5, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) recvfrom$x25(r3, &(0x7f0000000180)=""/135, 0x47, 0x140, &(0x7f0000000080)={0x9, @null=' \xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xb819000000000000}]) [ 748.396408] FAULT_INJECTION: forcing a failure. [ 748.396408] name failslab, interval 1, probability 0, space 0, times 0 [ 748.470061] CPU: 0 PID: 24532 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 748.477046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.477053] Call Trace: [ 748.477078] dump_stack+0x172/0x1f0 [ 748.477102] should_fail.cold+0xa/0x1b [ 748.477123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 748.477140] ? lock_downgrade+0x880/0x880 [ 748.477169] __should_failslab+0x121/0x190 [ 748.477189] should_failslab+0x9/0x14 [ 748.477206] kmem_cache_alloc_trace+0x2cc/0x760 [ 748.477225] ? kasan_check_write+0x14/0x20 [ 748.477240] ? do_raw_read_unlock+0x3f/0x70 [ 748.477259] flow_init+0x44/0xf0 [ 748.477275] tc_new_tfilter+0xaf1/0x1790 [ 748.477301] ? tc_del_tfilter+0xe60/0xe60 [ 748.477315] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 748.477332] ? mutex_trylock+0x1e0/0x1e0 [ 748.518744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.518765] ? tc_del_tfilter+0xe60/0xe60 [ 748.518780] rtnetlink_rcv_msg+0x463/0xb00 [ 748.518798] ? rtnetlink_put_metrics+0x560/0x560 [ 748.538910] ? netlink_deliver_tap+0x22d/0xc20 [ 748.538931] ? find_held_lock+0x35/0x130 [ 748.538950] netlink_rcv_skb+0x17d/0x460 [ 748.538969] ? rtnetlink_put_metrics+0x560/0x560 [ 748.538986] ? netlink_ack+0xb30/0xb30 [ 748.539004] ? kasan_check_read+0x11/0x20 [ 748.539025] ? netlink_deliver_tap+0x254/0xc20 [ 748.539047] rtnetlink_rcv+0x1d/0x30 [ 748.539061] netlink_unicast+0x537/0x720 [ 748.539077] ? netlink_attachskb+0x770/0x770 [ 748.539095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.566192] netlink_sendmsg+0x8ae/0xd70 19:47:17 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x500000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 748.566216] ? netlink_unicast+0x720/0x720 [ 748.566240] ? selinux_socket_sendmsg+0x36/0x40 [ 748.566257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.566273] ? security_socket_sendmsg+0x8d/0xc0 [ 748.566287] ? netlink_unicast+0x720/0x720 [ 748.566304] sock_sendmsg+0xd7/0x130 [ 748.566321] ___sys_sendmsg+0x3e2/0x920 [ 748.566342] ? copy_msghdr_from_user+0x430/0x430 [ 748.566361] ? lock_downgrade+0x880/0x880 [ 748.614268] ? kasan_check_read+0x11/0x20 [ 748.614291] ? __fget+0x367/0x540 [ 748.614311] ? iterate_fd+0x360/0x360 [ 748.614331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.614345] ? proc_fail_nth_write+0x9d/0x1e0 [ 748.614367] ? __fget_light+0x1a9/0x230 [ 748.627335] ? __fdget+0x1b/0x20 [ 748.662574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.662591] ? sockfd_lookup_light+0xcb/0x180 [ 748.662610] __sys_sendmmsg+0x1bf/0x4e0 [ 748.662631] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 748.662652] ? kasan_check_write+0x14/0x20 [ 748.662677] ? __sb_end_write+0xd9/0x110 [ 748.662694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.675467] ? fput+0x128/0x1a0 [ 748.675486] ? ksys_write+0x1f1/0x2d0 [ 748.675507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 748.675524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 748.675539] ? do_syscall_64+0x26/0x620 [ 748.675556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.675570] ? do_syscall_64+0x26/0x620 [ 748.675593] __x64_sys_sendmmsg+0x9d/0x100 [ 748.675614] do_syscall_64+0xfd/0x620 [ 748.698506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.698519] RIP: 0033:0x459a29 [ 748.698535] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.698544] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 748.698560] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 748.698567] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 748.698578] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 748.720679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 748.720689] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 19:47:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6000000000000000) 19:47:17 executing program 2: syz_read_part_table(0x500, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc02b000000000000}]) [ 748.926205] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 748.958179] loop4: partition table partially beyond EOD, truncated [ 748.989933] loop4: p1 start 125 is beyond EOD, truncated [ 749.019819] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 749.060890] loop4: p3 size 2 extends beyond EOD, truncated [ 749.098123] loop4: p4 size 32768 extends beyond EOD, truncated [ 749.108123] Dev loop2: unable to read RDB block 2 [ 749.118376] loop2: unable to read partition table [ 749.136446] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 749.148930] loop2: partition table beyond EOD, truncated [ 749.163290] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 19:47:17 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010575cbfd99000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:47:17 executing program 3 (fault-call:9 fault-nth:9): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {0x0, 0xedc5f8fd7eb629a0}, {}, {0x3}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:47:17 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x600000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:47:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x1}}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6558000000000000) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xc80e000000000000}]) [ 749.204173] loop4: p6 size 32768 extends beyond EOD, truncated [ 749.389111] FAULT_INJECTION: forcing a failure. [ 749.389111] name failslab, interval 1, probability 0, space 0, times 0 [ 749.429297] CPU: 0 PID: 24793 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 749.436296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.445673] Call Trace: [ 749.448290] dump_stack+0x172/0x1f0 [ 749.451944] should_fail.cold+0xa/0x1b [ 749.455865] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 749.461011] ? lock_downgrade+0x880/0x880 [ 749.465199] __should_failslab+0x121/0x190 [ 749.469479] should_failslab+0x9/0x14 [ 749.473301] kmem_cache_alloc_trace+0x2cc/0x760 [ 749.477988] ? memset+0x32/0x40 [ 749.481291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.486839] ? nla_parse+0x1fc/0x2f0 [ 749.490570] flow_change+0x513/0x1cf0 [ 749.494382] ? should_fail+0x14d/0x85c [ 749.498295] ? flow_dump+0xa00/0xa00 [ 749.502034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.502048] ? flow_dump+0xa00/0xa00 [ 749.502064] tc_new_tfilter+0xc54/0x1790 [ 749.502091] ? tc_del_tfilter+0xe60/0xe60 [ 749.502109] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 749.502131] ? mutex_trylock+0x1e0/0x1e0 19:47:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x700000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 749.502169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.502184] ? tc_del_tfilter+0xe60/0xe60 [ 749.502198] rtnetlink_rcv_msg+0x463/0xb00 [ 749.502219] ? rtnetlink_put_metrics+0x560/0x560 [ 749.502240] ? netlink_deliver_tap+0x22d/0xc20 [ 749.502255] ? find_held_lock+0x35/0x130 [ 749.502272] netlink_rcv_skb+0x17d/0x460 [ 749.524121] ? rtnetlink_put_metrics+0x560/0x560 [ 749.524141] ? netlink_ack+0xb30/0xb30 [ 749.524157] ? kasan_check_read+0x11/0x20 [ 749.524177] ? netlink_deliver_tap+0x254/0xc20 [ 749.576925] rtnetlink_rcv+0x1d/0x30 [ 749.580660] netlink_unicast+0x537/0x720 [ 749.584741] ? netlink_attachskb+0x770/0x770 [ 749.589169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.594724] netlink_sendmsg+0x8ae/0xd70 [ 749.598807] ? netlink_unicast+0x720/0x720 [ 749.598831] ? selinux_socket_sendmsg+0x36/0x40 [ 749.598847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.598863] ? security_socket_sendmsg+0x8d/0xc0 [ 749.598877] ? netlink_unicast+0x720/0x720 [ 749.598894] sock_sendmsg+0xd7/0x130 [ 749.598911] ___sys_sendmsg+0x3e2/0x920 19:47:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x800000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 749.598930] ? copy_msghdr_from_user+0x430/0x430 [ 749.598951] ? lock_downgrade+0x880/0x880 [ 749.598970] ? kasan_check_read+0x11/0x20 [ 749.607865] ? __fget+0x367/0x540 [ 749.607885] ? iterate_fd+0x360/0x360 [ 749.607904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.607919] ? proc_fail_nth_write+0x9d/0x1e0 [ 749.607938] ? __fget_light+0x1a9/0x230 [ 749.607954] ? __fdget+0x1b/0x20 [ 749.607969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.607983] ? sockfd_lookup_light+0xcb/0x180 [ 749.608001] __sys_sendmmsg+0x1bf/0x4e0 [ 749.608022] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 749.608039] ? kasan_check_write+0x14/0x20 [ 749.690338] ? __sb_end_write+0xd9/0x110 [ 749.694496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.700037] ? fput+0x128/0x1a0 [ 749.703316] ? ksys_write+0x1f1/0x2d0 [ 749.707118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.711876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.716631] ? do_syscall_64+0x26/0x620 [ 749.720606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.726236] ? do_syscall_64+0x26/0x620 [ 749.730222] __x64_sys_sendmmsg+0x9d/0x100 [ 749.734475] do_syscall_64+0xfd/0x620 [ 749.738267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.743445] RIP: 0033:0x459a29 [ 749.747167] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.766086] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 749.773792] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 19:47:18 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaab09, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000007f000001d4b1e608c416cf2347674fe0a499a98b45b356dc595e0a80d3a2af4985492dbe4afe1ea74d27b9b91369c1a9f37fbb37388577075e33ee"], 0x18) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:47:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd020000000000000}]) [ 749.781063] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 749.788330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 749.795586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 749.802845] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 749.818242] kasan: CONFIG_KASAN_INLINE enabled [ 749.823435] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 749.851656] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 749.857946] CPU: 0 PID: 24793 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 749.864869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.874237] RIP: 0010:tcf_action_destroy+0x71/0x160 [ 749.879243] Code: c3 08 44 89 ee e8 8f 9e ea fb 41 83 fd 20 0f 84 c9 00 00 00 e8 00 9d ea fb 48 89 d8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 <80> 3c 08 00 0f 85 c0 00 00 00 4c 8b 33 4d 85 f6 0f 84 9d 00 00 00 [ 749.898130] RSP: 0018:ffff8882084df210 EFLAGS: 00010246 [ 749.903483] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 749.910738] RDX: 0000000000040000 RSI: ffffffff8580c5f0 RDI: 0000000000000000 [ 749.918000] RBP: ffff8882084df240 R08: ffff88802cc704c0 R09: ffffed1015d04733 [ 749.925256] R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000 [ 749.932513] R13: 0000000000000000 R14: 00000000fffffff4 R15: 0000000000000001 [ 749.939772] FS: 00007fb39f978700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 749.947989] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 749.953859] CR2: 00007f85414a8518 CR3: 00000001f8490000 CR4: 00000000001406f0 [ 749.961115] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 749.968372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 749.975638] Call Trace: [ 749.978226] tcf_exts_destroy+0x38/0xb0 [ 749.982205] flow_change+0xc2f/0x1cf0 [ 749.986010] ? should_fail+0x14d/0x85c [ 749.989889] ? flow_dump+0xa00/0xa00 [ 749.993597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.999148] ? flow_dump+0xa00/0xa00 [ 750.002848] tc_new_tfilter+0xc54/0x1790 [ 750.006901] ? tc_del_tfilter+0xe60/0xe60 [ 750.011037] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 750.015447] ? mutex_trylock+0x1e0/0x1e0 [ 750.019537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.025076] ? tc_del_tfilter+0xe60/0xe60 [ 750.029308] rtnetlink_rcv_msg+0x463/0xb00 [ 750.033533] ? rtnetlink_put_metrics+0x560/0x560 [ 750.038280] ? netlink_deliver_tap+0x22d/0xc20 [ 750.042853] ? find_held_lock+0x35/0x130 [ 750.046903] netlink_rcv_skb+0x17d/0x460 [ 750.050951] ? rtnetlink_put_metrics+0x560/0x560 [ 750.055693] ? netlink_ack+0xb30/0xb30 [ 750.059572] ? kasan_check_read+0x11/0x20 [ 750.063712] ? netlink_deliver_tap+0x254/0xc20 [ 750.068283] rtnetlink_rcv+0x1d/0x30 [ 750.071988] netlink_unicast+0x537/0x720 [ 750.076040] ? netlink_attachskb+0x770/0x770 [ 750.080439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.085976] netlink_sendmsg+0x8ae/0xd70 [ 750.090029] ? netlink_unicast+0x720/0x720 [ 750.094254] ? selinux_socket_sendmsg+0x36/0x40 [ 750.098910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.104432] ? security_socket_sendmsg+0x8d/0xc0 [ 750.109175] ? netlink_unicast+0x720/0x720 [ 750.113400] sock_sendmsg+0xd7/0x130 [ 750.117102] ___sys_sendmsg+0x3e2/0x920 [ 750.121065] ? copy_msghdr_from_user+0x430/0x430 [ 750.125910] ? lock_downgrade+0x880/0x880 [ 750.130049] ? kasan_check_read+0x11/0x20 [ 750.134191] ? __fget+0x367/0x540 [ 750.137633] ? iterate_fd+0x360/0x360 [ 750.141419] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.146944] ? proc_fail_nth_write+0x9d/0x1e0 [ 750.151431] ? __fget_light+0x1a9/0x230 [ 750.155405] ? __fdget+0x1b/0x20 [ 750.158759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.164281] ? sockfd_lookup_light+0xcb/0x180 [ 750.168764] __sys_sendmmsg+0x1bf/0x4e0 [ 750.172813] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 750.177133] ? kasan_check_write+0x14/0x20 [ 750.181359] ? __sb_end_write+0xd9/0x110 [ 750.186450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.191973] ? fput+0x128/0x1a0 [ 750.195244] ? ksys_write+0x1f1/0x2d0 [ 750.199049] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.203793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.208536] ? do_syscall_64+0x26/0x620 [ 750.212507] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.217855] ? do_syscall_64+0x26/0x620 [ 750.221818] __x64_sys_sendmmsg+0x9d/0x100 [ 750.226041] do_syscall_64+0xfd/0x620 [ 750.229830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.235007] RIP: 0033:0x459a29 [ 750.238204] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.257091] RSP: 002b:00007fb39f977c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 750.264874] RAX: ffffffffffffffda RBX: 00007fb39f977c90 RCX: 0000000000459a29 [ 750.272142] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 750.279590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 750.286845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb39f9786d4 [ 750.294098] R13: 00000000004c742e R14: 00000000004dcfe8 R15: 0000000000000007 [ 750.301355] Modules linked in: 19:47:18 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x806000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 750.369627] ---[ end trace c67c5b1df9dfb9e7 ]--- [ 750.374697] RIP: 0010:tcf_action_destroy+0x71/0x160 [ 750.380963] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 750.383902] Code: c3 08 44 89 ee e8 8f 9e ea fb 41 83 fd 20 0f 84 c9 00 00 00 e8 00 9d ea fb 48 89 d8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 <80> 3c 08 00 0f 85 c0 00 00 00 4c 8b 33 4d 85 f6 0f 84 9d 00 00 00 [ 750.385813] kobject: 'loop2' (000000009f625744): kobject_uevent_env [ 750.407310] RSP: 0018:ffff8882084df210 EFLAGS: 00010246 [ 750.411432] loop4: partition table partially beyond EOD, truncated [ 750.416750] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 750.423263] kobject: 'loop4' (0000000066cff568): kobject_uevent_env [ 750.433134] RDX: 0000000000040000 RSI: ffffffff8580c5f0 RDI: 0000000000000000 [ 750.437060] kobject: 'loop4' (0000000066cff568): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 750.445119] RBP: ffff8882084df240 R08: ffff88802cc704c0 R09: ffffed1015d04733 19:47:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000, 0xd803000000000000}]) [ 750.460258] kobject: 'loop2' (000000009f625744): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.464060] R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000 [ 750.484445] kobject: 'loop5' (00000000a4ceb5ee): kobject_uevent_env [ 750.487916] R13: 0000000000000000 R14: 00000000fffffff4 R15: 0000000000000001 [ 750.498883] FS: 00007fb39f978700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 750.499124] kobject: 'loop5' (00000000a4ceb5ee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 750.507775] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 750.523502] CR2: 0000000000625208 CR3: 00000001f8490000 CR4: 00000000001406e0 [ 750.531410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 750.533581] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 750.544643] loop4: p1 start 153 is beyond EOD, truncated [ 750.550520] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 750.556294] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 750.557777] loop2: partition table partially beyond EOD, [ 750.565483] kobject: 'loop1' (000000006ffad117): kobject_uevent_env [ 750.574779] Kernel panic - not syncing: Fatal exception [ 750.577690] kobject: 'loop1' (000000006ffad117): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 750.584246] Kernel Offset: disabled [ 750.599116] Rebooting in 86400 seconds..